SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
www.ijeee-apm.com International Journal of Electrical & Electronics Engineering 7
IJEEE, Vol. 1, Issue 1 (Jan-Feb 2014) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
Design of Image Compression Algorithm
Using Matlab
Abhishek Thakur1
, Rajesh Kumar2
, Amandeep Bath3
, Jitender Sharma4
1,2,3
Electronics & Communication Department, IGCE, Punjab, India
1
abhithakur25@gmail.com, 2
errajeshkumar2002@gmail.com,
3
amandeep_batth@rediffmail.com, 4
er_jitender2007@yahoo.co.in
Abstract- This paper gives the idea of recent developments
in the field of image security and improvements in image
security. Images are used in many applications and to provide
image security using image encryption and authentication.
Image encryption techniques scramble the pixels of the image
and decrease the correlation among the pixels, such that the
encrypted image cannot be accessed by unauthorized user.
This study proposes a method for encrypting the sender’s
messages using new algorithm called chaotic encryption
method. This key will be used for encrypting and decrypting
the messages which are transmitted between two sides.
Chaotic encryption technique is the new way of cryptography.
Emphasizing the image security, this paper is to design the
enhanced secure algorithm which uses chaotic encryption
method to ensure improved security and reliability.
Index Terms- Cryptography, Cryptography key, RGB
image, LSB, image key.
I. INTRODUCTION
In telegraphy Morse code, is a data compression
technique using shorter codewords for letters invented in
1838. In late 1940s information theory is invented. In 1949
Claude Shannon and Robert Fano develop a way to assign
code words based on probabilities of blocks. Later an optimal
method for doing this was developed by David Huffman in
1951. Early implementations were done in hardware, with
specific choices of codewords being made as compromises
between error correction and compression. In the mid-1970s,
Huffman encoding for dynamically updating codewords
based on the actual data encountered is invented. Pointer
based encoding is invented in 1977 by Abraham Lempel and
Jacob Ziv. LZW algorithm is invented in the mid-1980s,
which became the method for most general purpose
compression systems. It was used in programs, as well as in
hardware devices such as modems [1]. In the early 1990s,
lossy compression method is widely used. Today image
compression standards include: FAX CCITT 3 (run-length
encoding, with codewords determined by Huffman coding
from a definite distribution of run lengths); BMP (run-length
encoding, etc.); JPEG (lossy discrete cosine transform, then
Huffman or arithmetic coding); GIF (LZW); TIFF (FAX,
JPEG, GIF, etc.)[2]. Typical compression ratios currently
achieved for text are around 3:1, and for photographic images
around 2:1 lossless, and for line diagrams and text images
around 3:1, and 20:1 lossy. Images on internet grow very fast
and hence each server needs to store high volume of data
about the images and images are one of the most important
data about information. As a result servers have a high
volume of images with them and require a huge hard disk
space and transmission bandwidth to store these images. Most
of the time transmission bandwidth is not sufficient for
storing all the image data. Image compression is the process
of encoding information using fewer bits. Compression is
useful because it helps to reduce the consumption of
expensive resources, such as transmission bandwidth or hard
disk space. Compression scheme for image may require
expensive hardware for the image to be decompressed fast
enough to be viewed as its being decompressed [3].
Compression schemes therefore involves trade-offs among
various factors, including the degree of compression, the
amount of distortion introduced, and the computational
resources required to compress and uncompress the data.
Image compression is the application of Data compression.
Image compression reduce the size in bytes of a graphics file
without degrading the quality of the image. The purpose of
reduction in file size allows more images to be stored in a
given amount of disk or memory space. It also reduces the
time required for images to be sent over the Internet or
downloaded from Web pages. There are several different
ways in which image files can be compressed. For Internet
use, the two most common compressed graphic image formats
are the JPEG format and the GIF format. The JPEG method is
more often used for photographs, while the GIF method is
commonly used for line art and other images in which
geometric shapes are relatively simple [4-6].
Other techniques for image compression include the
use of fractals and wavelets. These methods have not gained
widespread acceptance for use on the Internet as of this
writing. However, both methods offer promise because they
offer higher compression ratios than the JPEG or GIF
methods for some types of images. Another new method that
International Journal of Electrical & Electronics Engineering 8 www.ijeee-apm.com
may in time replace the GIF format is the PNG format [7].
With a compression ratio of 32:1, the space, bandwidth and
transmission time requirements can be reduced by the factor
of 32, with acceptable quality. Image compression and coding
techniques explore three types of redundancies:
A. Coding redundancy:
Coding redundancy is present when less than optimal code
words are used. This type of coding is always reversible and
usually implemented using look up tables (LUTs) [8].
Examples of image coding schemes that explore coding
redundancy are the Huffman codes and the arithmetic coding
technique.
B. Inter pixel redundancy:
This type of redundancy sometimes called spatial
redundancy, inter frame redundancy, or geometric
redundancy. This redundancy can be explored in several
ways, one of which is by predicting a pixel value based on the
values of its neighboring pixels. In order to do so, the original
2-D array of pixels is usually mapped into a different format,
e.g., an array of differences between adjacent pixels. If the
original image pixels can be reconstructed from the
transformed data set the mapping is said to be reversible.
Examples of compression techniques that explore the
interpixel redundancy include: Constant Area Coding (CAC),
(1-D or 2-D) Run Length Encoding (RLE) techniques, and
many predictive coding algorithms such as Differential Pulse
Code Modulation (DPCM) [9].
C. Psycho visual redundancy:
Many experiments on the psychophysical aspects of human
vision have proven that the human eye does not respond with
equal sensitivity to all incoming visual information; some
pieces of information are more important than others. The
knowledge of which particular types of information are more
or less relevant to the final human user have led to image and
video compression techniques that aim at eliminating or
reducing any amount of data that is psycho visually
redundant. The end result of applying these techniques is a
compressed image file, whose size and quality are smaller
than the original information, but whose resulting quality is
still acceptable for the application at hand. The loss of quality
that ensues as a byproduct of such techniques is frequently
called quantization, as to indicate that a wider range of input
values is normally mapped into a narrower range of output
values thorough an irreversible process [10]. In order to
establish the nature and extent of information loss, different
fidelity criteria (some objective such as root mean square
(RMS) error, some subjective, such as pair wise comparison
of two images encoded with different quality settings) can be
used. Most of the image coding algorithms in use today
exploit this type of redundancy, such as the Discrete Cosine
Transform (DCT)-based algorithm at the heart of
the JPEG encoding standard.
II. TECHNIQUES USED FOR IMAGE COMPRESSION
A. Image Compression Model:
Image compression system is composed of two distinct
functional components: an encoder and a decoder. The
encoder performs the complementary operation of
compression, and the decoder performs the complementary
operation of decompression. Both compression and
decompression operations can be performed in software, as in
the case in web browsers and many commercial image editing
programs, or in a combination of hardware and firmware, as
in commercial DVD players [11]. A codec is a device or
program that is capable of both encoding and decoding.
Input image f(x, y) is fed into the encoder, which creates a
compressed representation of the input. This representation is
stored for latter use, or transmitted for storage and use at a
remote location. When the compressed representation is
presentation is presented to its complementary decoder, a
reconstructed output image f^(x, y) is generated. In general,
f^(x,y) may or may not be a replica of f(x,y). If it is, the
compression system is called error free, lossless or
information preserving. If not, the reconstructed output image
is distorted and the compression system is referred to as lossy.
B. The encoding or compression process:
The encoder is designed to remove the redundancies. In
the first stage of the encoding process, a mapper transforms
f(x, y) into a format designed to reduce spatial and temporal
redundancy. This operation generally is reversible and may or
may not reduce directly the amount of data required to
represent the image. The run length coding is an example of
the mapping that normally yields compression in the first step
of encoding process. The quantizer reduces the accuracy of
the mapper’s output in accordance with per-established
fidelity criterion. The goal is to keep irrelevant information
out of the compressed representation. This operation is
irreversible. It must be omitted when error-free compression
is desired. In the third and final stage of the encoding process,
the symbol coder generates a fixed or variable length code to
represent the quantizer output and maps the output in
accordance with the code [12]. In many cases, a variable –
length code is used. The shortest code words are assigned to
the most frequently occurring quantizer output values- thus
minimizing coding redundancy. This operation is irreversible.
Upon its completion, the input image has been processed for
the removal of each of the three redundancies (Coding,
Interpixel , Psycho visual).
C. The Decoding or decompression process:
The decoder contains only two components: a symbol
decoder and an inverse mapper. They perform, in reverse
order, the inverse operation of encoder’s symbol encoder and
mapper. Because quantization results in irreversible
information loss, an inverse quantizer block is not included in
the general decoder model [13].
D. Image Compression Algorithms:
Image compression can be lossy or lossless. Lossless
compression is sometimes preferred for artificial images such
www.ijeee-apm.com International Journal of Electrical & Electronics Engineering 9
as technical drawings, icons or comics. This is because lossy
compression methods, especially when used at low bit rates,
introduce compression artifacts. Lossless compression
methods may also be preferred for high value content, such as
medical imagery or image scans made for archival purposes.
Lossy methods are especially suitable for natural images such
as photos in applications where minor (sometimes
imperceptible) loss of fidelity is acceptable to achieve a
substantial reduction in bit rate [14-15].
E. Various Lossy Compression Methods are:
1) Cartesian Perceptual Compression: Also known as
CPC
2) DjVu
3) Fractal compression
4) HAM, hardware compression of color information
used in Amiga computers
5) ICER, used by the Mars Rovers: related to JPEG 2000
in its use of wavelets
6) JPEG
7) JPEG 2000, JPEG's successor format that uses
wavelets.
8) JBIG2
9) PGF, Progressive Graphics File (lossless or lossy
compression) Wavelet compression.
F. Various Loss-Less Compression Method are:
1) Run-length encoding – used as default method in PCX
and as one of possible in BMP, TGA, TIFF
2) Entropy coding
3) Adaptive dictionary algorithms such as LZW – used in
GIF and TIFF
4) Deflation – used in PNG, MNG and TIFF.
G. The steps involved in compressing and decompressing of
image are:
1) Specifying the Rate (bits available) and Distortion
(tolerable error) parameters for the target image.
2) Dividing the image data into various classes, based on
their importance.
3) Dividing the available bit budget among these classes,
such that the distortion is a minimum.
4) Quantize each class separately using the bit allocation
information derived in step 3.
5) Encode each class separately using an entropy coder
and write to the file.
6) Reconstructing the image from the compressed data is
usually a faster process than compression. The steps
involved are step 7 to step 9.
7) Read in the quantized data from the file, using an
entropy decoder. (Reverse of step 5).
8) Dequantized the data. (Reverse of step 4).
9) Rebuild the image. (Reverse of step 2).
H. Calculation of image compression:
There are various types of terms that are used in
calculation of image compression. Some are listed below:
a. Cartesian Perceptual Compression: Also known as CPC
b. Compression Ratio = Uncompressed Size/Compressed
Size
c. Space Saving = [1- compressed Size/Uncompressed Size]
d. Data Rate Savings = [1- compressed data
rate/Uncompressed data rate]
The PSNR is most commonly used as a measure of quality of
reconstruction in image compression etc. It is most easily
defined via the mean squared error (MSE) which for two m×n
monochrome images I and K where one of the images is
considered a noisy approximation of the other is defined as:






1
0
1
0
),(),(
1 m
i
n
j
jiKjiI
MN
MSE 2
The PSNR is defined as:













MSE
MAX
MSE
MAX
PSNR 1
10
2
1
10 log20log10
Here, MAXi is the maximum possible pixel value of the
image. When the pixels are represented using 8 bits per
sample, this is 255. More generally, when samples are
represented using linear PCM with B bits per sample, MAXI is
2B
-1.
Signal-to-noise ratio is a term for the power ratio between a
signal (meaningful information) and the background noise:
2







Sinal
Signal
Noise
Signal
A
A
P
P
SNR
If the signal and the noise are measured across the same
impedance then the SNR can be obtained by calculating 20
times the base-10 logarithm of the amplitude ratio:













Noise
Signal
Noise
Signal
A
A
P
P
dbSNR 1010 log20log10)(
The MSE of an estimator with respect to the estimated
parameter θ is defined as:
MSE ()=E((-)2)
The MSE can be written as the sum of the variance and
the squared bias of the estimator:
MSE ()=Var()+(Bias(,))2
In a statistical model where the estimand is unknown, the
MSE is a random variable whose value must be estimated.
This is usually done by the sample mean, with θj being
realizations of the estimator of size n.
2
1
''
)(
1
)(   
n
j
j
n
MSE
III. COMPRESSION TECHNOLOGIES
A. All Block Truncation Coding:
Block Truncation Coding (BTC) is a well known
compression scheme proposed in 1979 for the greyscale. It
International Journal of Electrical & Electronics Engineering 10 www.ijeee-apm.com
was also called the moment preserving block truncation
because it preserves the first and second moments of each
image block. It is a lossy image compression technique. It is a
simple technique which involves less computational
complexity. BTC is a recent technique used for compression
of monochrome image data. It is one-bit adaptive moment-
preserving quantizer that preserves certain statistical moments
of small blocks of the input image in the quantized output.
The original algorithm of BTC preserves the standard mean
and the standard deviation. The statistical overheads Mean
and the Standard deviation are to be coded as part of the
block. The truncated block of the BTC is the one-bit output of
the quantizer for every pixel in the block [1].
B. Wavelet Transform:
A wavelet image compression system can be created by
selecting a type of wavelet function, quantizer, and statistical
coder. The first step in wavelet compression are performing a
discrete wavelet Transformation (DWT), after that
quantization of the wavelet space image sub bands, and then
encoding these sub bands. Wavelet images are not
compressed images; rather it is quantization and encoding
stages that do the image compression. Image decompression,
or reconstruction, is achieved by carrying out the above steps
in reverse and inverse order [4].
C. EZW Algorithm:
In embedded coding, the coded bits are ordered in
accordance with their importance and all lower rate codes are
provided at the beginning of the bit stream. Using an
embedded code, the encoder can terminate the encoding
process at any stage, so as to exactly satisfy the target bit-rate
specified by the channel. To achieve this, the encoder can
maintain a bit count and truncate the bit-stream, whenever the
target bit rate is achieved. Although the embedded coding
used in EZW is more general and sophisticated than the
simple bit-plane coding, in spirit, it can be compared with the
latter, where the encoding commences with the most
significant bit plane and progressively continues with the next
most significant bit-plane and so on. If target bit-rate is
achieved before the less significant bit planes are added to the
bit-stream, there will be reconstruction error at the receiver,
but the “significance ordering” of the embedded bit stream
helps in reducing the reconstruction error at the given target
bit rate [2].
D. Fractal Image Compression and Decompression:
Fractal compression is a lossy image compression
method using fractals to achieve high levels of compression.
The method is best suited for photographs of natural scenes
(trees, mountains, ferns, clouds).
The fractal compression technique relies on the fact that in
certain images, parts of the image resemble other parts of the
same image. Fractal algorithms convert these parts, or more
precisely, geometric shapes into mathematical data called
"fractal codes" which are used to recreate the encoded image.
Fractal compression differs from pixel-based compression
schemes such as JPEG, GIF and MPEG since no pixels are
saved. Once an image has been converted into fractal code its
relationship to a specific resolution has been lost. The image
can be recreated to fill any screen size without the
introduction of image artifacts that occurs in pixel based
compression schemes.
IV.RESULTS
Matlab approach has been implemented for compressing
images. Matlab is capable of handling simultaneous multiple
matrix of images. In this firstly given RGB image is divided
into three matrices which are compressed individually and
then these are merged together to construct final compressed
image. Image processing tool box of matlab is used to
perform all compression task.
Matlab based environment ensures high scalability,
availability and reliability through redundancy mechanisms.
Hence matlab computing proves to be an appropriate platform
for compressing images by various techniques. Matlab
provides High-level language for technical computing and
Development environment for managing code, files and data.
It is an Interactive tool for iterative exploration, design and
problem solving. It provides Mathematical functions for
linear algebra, statistics, Fourier analysis, filtering,
optimization, numerical integration and Tools for building
custom graphical user interfaces.
In this study compressing of images is taken by splitting
image matrix into R,G,B matrix which are compressed
individual and then these are merged for construction of
compressed image. It is an efficient approach for performing
compression for large size images of different format. Time
and space is reduced to great extent with the help of Matlab
computing.
An RGB image, sometimes referred to as a true
color image, is stored as an m-by-n-by-3 data array that
defines red, green and blue color components for each
individual pixel. RGB images do not use a palette.
The colour of each pixel is determined by the combination
of the red, green, and blue intensities stored in each colour
plane at the pixel's location. Graphics file formats store RGB
images as 24-bit images, where the red, green, and blue
components are 8 bits each. This yields a potential of 16
million colours.
A. Block Truncation Coding:
In table 1 we take the block size of 8*8, 64*64 and
perform block truncation coding. These results are shown
in figure 1.
Table 1: Block Truncation Coding
Block Size 8*8 64*64
MSE 3.5077e+003 3.2613e+003
PSNR 12.6805 12.9969
www.ijeee-apm.com International Journal of Electrical & Electronics Engineering 11
a)Original Image b) 8*8 Block Truncation c) 64*64 Block Truncation
Fig. 1: Block Truncation Coding
B. Wavelet Compression:
In table 2 Wavelet Compression encode time, MSE and
PSNR is shown with Decomposition Level 3 and 7. Figure
2 shows results for Wavelet Compression.
Table 2: Wavelet Compression
Decom. Level 4 7
Encode time 35.188 Sec. 35.359 Sec.
MSE 3.5609e+003 3.6379e+003
PSNR 12.6152 12.5224
a) Original b) Level 4 c) Level 7
Fig. 2: Wavelet Compression
C. Embedded Zerotree:
In table 3 Embedded Zerotree encode time, decode time,
MSE and PSNR is shown with decomposition level 4 and
6. Figure 3 shows the results for Embedded Zerotree.
Table 3:Embedded Zerotree
Decom. Level 4 6
Encode time 237.7180 Sec. 243.8910 Sec.
Decode time 119.9070 Sec. 123.4360 Sec.
MSE 3.4228e+003 3.4228e+003
PSNR 12.7870 12.7870
a) Original b) Level 4 c) Level 6
Fig. 3: Embedded Zerotree
D. Fractal Image Compression:
In table 4 Fractal Image Compression encode time, decode
time, MSE and PSNR is shown with increase in block size
of 10 and 25. Figure 4 shows the results for Fractal Image
Compression.
Table 4:Embedded Zerotree
Decom. Level 4 25
Encode time 300.0610 Sec. 302.310 Sec.
Decode time 41.0320 Sec. 40.703 Sec.
MSE 3.5205e+003 2.9751e+003
PSNR 12.6648 13.3957
a) Original b) Block Size 2 c) Block Size 25
Fig. 4: Embedded Zerotree
Fig. 5 Flowchart for implementation of compressing image in matlab
Environment
Different types of image are taken for discussing their results.
In our study four different types of images are taken:
International Journal of Electrical & Electronics Engineering 12 www.ijeee-apm.com
a. Face image
Encode Process Time as Second of red =95.9850
Decode Process Time as Second of red =13.5620
Encode Process Time as Second of green =98.1410
Decode Process Time as Second of green =13.7970
Encode Process Time as Second of blue =96.9690
Decode Process Time as Second of blue =13.6560
Total encode time =291.0950
Total decode time =41.0150
Cr =6.2036
Encode_time =291.095seconds
The MSE performance is 56.72 dB
The psnr performance is 30.59 dB
Fig. 6 Face Image
b. Scene image:
Encode Process Time as Second of red =97.8600
Decode Process Time as Second of red =13.5630
Encode Process Time as Second of green =95.1560
Decode Process Time as Second of green =13.4220
Encode Process Time as Second of blue =95.9370
Decode Process Time as Second of blue =13.4690
Total encode time =288.9530
Total decode time =40.4540
Cr =1.0033
Encode time =288.953seconds
The MSE performance is 10.65 dB
The psnr performance is 37.86 dB
Fig. 7 Scene image
V. CONCLUSIONS
Images play an important role in our lives. They are used in
many applications. In our study we have applied different
type of compression technique on different type of images for
a PSNR value and compression ratio. In this paper, the
problem of compressing an image in Matlab environment has
been taken. A matlab compression approach has been
implemented for compressing images.
After analysis we have found that, scene Images Wavelet
provides the better result but compression ratio is high in case
of BTC and visual quality is better of BTC. For face Images
BTC perform the most compression. FIC provide almost same
result as compare to BTC, but fractal image compression take
a long time for compression, so we can use BTC as compare
to FIC when time in main concern. We analyzed the PSNR
obtained of compressed after each compression technique and
decides which technique can provide maximum PSNR for a
particular image.
We have done PSNR measures, but should also use objective
and subjective picture quality measures. The objective
measures such as PSNR and MSE do not correlate well with
subjective quality measures. Therefore, we should use PQS as
an objective measure that has good correlation to subjective
measurements. After this we will have an optimal system
having best compression ratio with best image quality.
REFERENCES
[1]. A. Kumar, P. Singh, “Comparative study of Block Truncation
Coding with EBTC”, International Journal of Advances in Computer
Networks and its Security, pp: 395-405, 2011.
[2]. D. Mohammed, F. Abou-Chadi, “Image Compression Using Block
Truncating Code”, JSAT, pp 9 – 1, 2011.
[3]. Q. Guan, “Research of Image Compression Based on Embedded
Zero-tree Wavelet Transform”, IEEE, pp: 591-595, 2011.
[4]. S. A. Abdul, k. B. A. Karim,” Wavelet transform and fast Fourier
transform for signal compression: a comparative study”, 2011
international conference on electronic devices, systems and
applications, IEEE, pp: 280-285, 2011.
[5]. P. aggarwal, B. Rani, “Performance Comparison of Image
Compression Using Wavelets”, IJCSC, IEEE, pp: 97-100, 2010.
[6]. Chunlei Jiang, Shuxin Yin,”A Hybrid Image Compression Algorithm
Based on Human Visual System” International Conference on
Computer Application and System Modeling, IEEE, pp: 170-173,
2010.
[7]. L. Hengjian, W. Jizhi, W. Yinglong, T. Min, X. Shujiang, “A
flexible and secure image compression coding algorithm”,
International Conference on Future Information Technology and
Management Engineering, IEEE, pp: 376-379, 2010.
[8]. S.P. Raja, A. Suruliandi, “Analysis of Efficient Wavelet based Image
Compression Techniques”, Second International conference on
Computing, Communication and Networking Technologies, IEEE,
pp: 1-6, 2010.
[9]. Shukla, M. Alwani, A. K. Tiwari, “A survey on lossless image
compression methods” 2nd international conference on computer
engineering and technology, IEEE vol 6, pp: 136-141, 2010.
[10]. X. Wu, W. Sun “Data Hiding in Block Truncation Coding”,
International Conference on Computational Intelligence and
Security, IEEE, pp: 406-410, 2010.
[11]. T. Y. Mei, T. J. Bo, “A Study of Image Compression Technique
Based on Wavelet Transform”, Fourth International Conference on
Genetic and Evolutionary Computing 2010 IEEE, 2010.
[12]. J. Bhattacharjee, “A Comparative study of Discrete Cosine
Transformation, Haar Transformation, Simultaneous Encryption and
Compression Techniques, International Conference on Digital Image
Processing”, ICDIP, 2009 Proceedings of the International
Conference on Digital Image Processing, Pages 279-283,2009.
[13]. B. Rani, R. K. Bansal and S. Bansal , “Comparison of JPEG and
SPIHT Image Compression Algorithms using Objective Quality
Measures” , Multimedia, Signal Processing and Communication
Technologies, IMPACT 2009, IEEE, 2009, Page no 90-93, 2009.
[14]. V. P. Lineswala , J. N. patel, “JPEG image compression and
transmission over wireless channel”, International Conference on
Advances in Computing, Control, and Telecommunication
Technologies, IEEE, pp: 643-645, 2009.
[15]. M. Grossber, I. Gladkova, S. Gottipat , M. Rabinowitz, P. Alabi, T.
George1, and A.Pacheco, “A Comparative Study of Lossless
Compression Algorithms on Multi-Spectral Imager Data”, Data
Compression Conference, IEEE, pp:447, 2009.
www.ijeee-apm.com International Journal of Electrical & Electronics Engineering 13
AUTHORS
First Author– Abhishek Thakur:
M. Tech. in Electronics and
Communication Engineering from
Punjab Technical University, MBA
in Information Technology from
Symbiosis Pune, M.H. Bachelor in
Engineering (B.E.- Electronics) from
Shivaji University Kolhapur, M.H.
Five years of work experience in
teaching and one year of work experience in industry. Area of
interest: Digital Image and Speech Processing, Antenna
Design and Wireless Communication. International
Publication: 7, National Conferences and Publication: 6, Book
Published: 4 (Microprocessor and Assembly Language
Programming, Microprocessor and Microcontroller, Digital
Communication and Wireless Communication). Working
with Indo Global College of Engineering Abhipur, Mohali,
P.B. since 2011.
Email address: abhithakur25@gmail.com
Second Author – Rajesh Kumar
is working as Associate Professor
at Indo Global College of
Engineering, Mohali, Punjab. He
is pursuing Ph.D from NIT,
Hamirpur, H.P. and has
completed his M.Tech from GNE,
Ludhiana, India. He completed
his B.Tech from HCTM, Kaithal,
India. He has 11 years of
academic experience. He has authored many research papers
in reputed International Journals, International and National
conferences. His areas of interest are VLSI, Microelectronics
and Image & Speech Processing.
Third Author – Amandeep Batth: M. Tech. in Electronics
and Communication Engineering from Punjab Technical
University, MBA in Human
Resource Management from
Punjab Technical University ,
Bachelor in Technology (B-Tech.)
from Punjab Technical University .
Six years of work experience in
teaching. Area of interest: Antenna
Design and Wireless
Communication. International
Publication: 1, National Conferences and Publication: 4.
Working with Indo Global College of Engineering Abhipur,
Mohali, P.B. since 2008.
Email address: amandeep_batth@rediffmail.com
Forth Author – Jitender Sharma: M. Tech. in Electronics and
Communication Engineering from Mullana University,
Ambala, Bachelor in Technology (B-Tech.)from Punjab
Technical University . Five years of work experience in
teaching. Area of interest:, Antenna Design and Wireless
Communication. International Publication: 1 National
Conferences and Publication:6 and Wireless
Communication). Working with Indo Global college since
2008.
E-mail address:er_jitender2007@yahoo.co.in

Contenu connexe

Tendances

Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standardsComparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standardsRishab2612
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compressionPradip Kumar
 
Project presentation image compression by manish myst, ssgbcoet
Project presentation image compression by manish myst, ssgbcoetProject presentation image compression by manish myst, ssgbcoet
Project presentation image compression by manish myst, ssgbcoetManish Myst
 
Multimedia communication jpeg
Multimedia communication jpegMultimedia communication jpeg
Multimedia communication jpegDr. Kapil Gupta
 
Presentation of Lossy compression
Presentation of Lossy compressionPresentation of Lossy compression
Presentation of Lossy compressionOmar Ghazi
 
Why Image compression is Necessary?
Why Image compression is Necessary?Why Image compression is Necessary?
Why Image compression is Necessary?Prabhat Kumar
 
Jpeg image compression using discrete cosine transform a survey
Jpeg image compression using discrete cosine transform   a surveyJpeg image compression using discrete cosine transform   a survey
Jpeg image compression using discrete cosine transform a surveyIJCSES Journal
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniqueseSAT Publishing House
 
A Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWTA Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWTIJSRD
 
Compression: Images (JPEG)
Compression: Images (JPEG)Compression: Images (JPEG)
Compression: Images (JPEG)danishrafiq
 
Image compression introductory presentation
Image compression introductory presentationImage compression introductory presentation
Image compression introductory presentationTariq Abbas
 
Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...
Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...
Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...saumyatapu
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compressionasodariyabhavesh
 
Image compression
Image compressionImage compression
Image compressionPREEYANKAV
 
Image compression and it’s security1
Image compression and it’s security1Image compression and it’s security1
Image compression and it’s security1Reyad Hossain
 
Image compression standards
Image compression standardsImage compression standards
Image compression standardskirupasuchi1996
 

Tendances (20)

Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standardsComparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compression
 
Image compression .
Image compression .Image compression .
Image compression .
 
Project presentation image compression by manish myst, ssgbcoet
Project presentation image compression by manish myst, ssgbcoetProject presentation image compression by manish myst, ssgbcoet
Project presentation image compression by manish myst, ssgbcoet
 
Multimedia communication jpeg
Multimedia communication jpegMultimedia communication jpeg
Multimedia communication jpeg
 
JPEG
JPEGJPEG
JPEG
 
Presentation of Lossy compression
Presentation of Lossy compressionPresentation of Lossy compression
Presentation of Lossy compression
 
Bit plane coding
Bit plane codingBit plane coding
Bit plane coding
 
JPEG Image Compression
JPEG Image CompressionJPEG Image Compression
JPEG Image Compression
 
Why Image compression is Necessary?
Why Image compression is Necessary?Why Image compression is Necessary?
Why Image compression is Necessary?
 
Jpeg image compression using discrete cosine transform a survey
Jpeg image compression using discrete cosine transform   a surveyJpeg image compression using discrete cosine transform   a survey
Jpeg image compression using discrete cosine transform a survey
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
 
A Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWTA Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWT
 
Compression: Images (JPEG)
Compression: Images (JPEG)Compression: Images (JPEG)
Compression: Images (JPEG)
 
Image compression introductory presentation
Image compression introductory presentationImage compression introductory presentation
Image compression introductory presentation
 
Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...
Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...
Project pptVLSI ARCHITECTURE FOR AN IMAGE COMPRESSION SYSTEM USING VECTOR QUA...
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compression
 
Image compression
Image compressionImage compression
Image compression
 
Image compression and it’s security1
Image compression and it’s security1Image compression and it’s security1
Image compression and it’s security1
 
Image compression standards
Image compression standardsImage compression standards
Image compression standards
 

Similaire à Design of Image Compression Algorithm Using Matlab

Enhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsEnhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsIJRES Journal
 
A Study of Image Compression Methods
A Study of Image Compression MethodsA Study of Image Compression Methods
A Study of Image Compression MethodsIOSR Journals
 
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...IAEME Publication
 
Lossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyIRJET Journal
 
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...Alexander Decker
 
REGION OF INTEREST BASED COMPRESSION OF MEDICAL IMAGE USING DISCRETE WAVELET ...
REGION OF INTEREST BASED COMPRESSION OF MEDICAL IMAGE USING DISCRETE WAVELET ...REGION OF INTEREST BASED COMPRESSION OF MEDICAL IMAGE USING DISCRETE WAVELET ...
REGION OF INTEREST BASED COMPRESSION OF MEDICAL IMAGE USING DISCRETE WAVELET ...ijcsa
 
A spatial image compression algorithm based on run length encoding
A spatial image compression algorithm based on run length encodingA spatial image compression algorithm based on run length encoding
A spatial image compression algorithm based on run length encodingjournalBEEI
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey ijsc
 
Paper id 25201490
Paper id 25201490Paper id 25201490
Paper id 25201490IJRAT
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )ijsc
 
ANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGijma
 
Iaetsd performance analysis of discrete cosine
Iaetsd performance analysis of discrete cosineIaetsd performance analysis of discrete cosine
Iaetsd performance analysis of discrete cosineIaetsd Iaetsd
 
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...IRJET Journal
 
A Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image CompressionA Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image CompressionEditor IJMTER
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniquesIRJET Journal
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationIJERA Editor
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationIJERA Editor
 
Modified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image CompressionModified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image Compressionidescitation
 

Similaire à Design of Image Compression Algorithm Using Matlab (20)

Enhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsEnhanced Image Compression Using Wavelets
Enhanced Image Compression Using Wavelets
 
A Study of Image Compression Methods
A Study of Image Compression MethodsA Study of Image Compression Methods
A Study of Image Compression Methods
 
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
 
M.sc.iii sem digital image processing unit v
M.sc.iii sem digital image processing unit vM.sc.iii sem digital image processing unit v
M.sc.iii sem digital image processing unit v
 
Lossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative Study
 
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
 
REGION OF INTEREST BASED COMPRESSION OF MEDICAL IMAGE USING DISCRETE WAVELET ...
REGION OF INTEREST BASED COMPRESSION OF MEDICAL IMAGE USING DISCRETE WAVELET ...REGION OF INTEREST BASED COMPRESSION OF MEDICAL IMAGE USING DISCRETE WAVELET ...
REGION OF INTEREST BASED COMPRESSION OF MEDICAL IMAGE USING DISCRETE WAVELET ...
 
A spatial image compression algorithm based on run length encoding
A spatial image compression algorithm based on run length encodingA spatial image compression algorithm based on run length encoding
A spatial image compression algorithm based on run length encoding
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey
 
Image Compression Techniques: A Survey
Image Compression Techniques: A SurveyImage Compression Techniques: A Survey
Image Compression Techniques: A Survey
 
Paper id 25201490
Paper id 25201490Paper id 25201490
Paper id 25201490
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
 
ANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKING
 
Iaetsd performance analysis of discrete cosine
Iaetsd performance analysis of discrete cosineIaetsd performance analysis of discrete cosine
Iaetsd performance analysis of discrete cosine
 
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
 
A Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image CompressionA Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image Compression
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
 
Modified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image CompressionModified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image Compression
 

Plus de IJEEE

A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...IJEEE
 
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...IJEEE
 
Automated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoAutomated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoIJEEE
 
An Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemAn Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemIJEEE
 
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierAn Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierIJEEE
 
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...IJEEE
 
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...IJEEE
 
Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas IJEEE
 
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...IJEEE
 
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyDesign Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyIJEEE
 
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewCarbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewIJEEE
 
Routing Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyRouting Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyIJEEE
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
 
Layout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyLayout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyIJEEE
 
Codec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsCodec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsIJEEE
 
Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications IJEEE
 
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsDesign of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsIJEEE
 
Layout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyLayout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyIJEEE
 

Plus de IJEEE (20)

A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
 
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
 
Automated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoAutomated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using Arduino
 
Id136
Id136Id136
Id136
 
Id135
Id135Id135
Id135
 
An Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemAn Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric System
 
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierAn Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
 
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
 
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
 
Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas
 
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
 
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyDesign Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
 
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewCarbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
 
Routing Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyRouting Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A Survey
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
 
Layout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyLayout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS Technology
 
Codec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsCodec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI Interconnects
 
Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications
 
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsDesign of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
 
Layout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyLayout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm Technology
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Design of Image Compression Algorithm Using Matlab

  • 1. www.ijeee-apm.com International Journal of Electrical & Electronics Engineering 7 IJEEE, Vol. 1, Issue 1 (Jan-Feb 2014) e-ISSN: 1694-2310 | p-ISSN: 1694-2426 Design of Image Compression Algorithm Using Matlab Abhishek Thakur1 , Rajesh Kumar2 , Amandeep Bath3 , Jitender Sharma4 1,2,3 Electronics & Communication Department, IGCE, Punjab, India 1 abhithakur25@gmail.com, 2 errajeshkumar2002@gmail.com, 3 amandeep_batth@rediffmail.com, 4 er_jitender2007@yahoo.co.in Abstract- This paper gives the idea of recent developments in the field of image security and improvements in image security. Images are used in many applications and to provide image security using image encryption and authentication. Image encryption techniques scramble the pixels of the image and decrease the correlation among the pixels, such that the encrypted image cannot be accessed by unauthorized user. This study proposes a method for encrypting the sender’s messages using new algorithm called chaotic encryption method. This key will be used for encrypting and decrypting the messages which are transmitted between two sides. Chaotic encryption technique is the new way of cryptography. Emphasizing the image security, this paper is to design the enhanced secure algorithm which uses chaotic encryption method to ensure improved security and reliability. Index Terms- Cryptography, Cryptography key, RGB image, LSB, image key. I. INTRODUCTION In telegraphy Morse code, is a data compression technique using shorter codewords for letters invented in 1838. In late 1940s information theory is invented. In 1949 Claude Shannon and Robert Fano develop a way to assign code words based on probabilities of blocks. Later an optimal method for doing this was developed by David Huffman in 1951. Early implementations were done in hardware, with specific choices of codewords being made as compromises between error correction and compression. In the mid-1970s, Huffman encoding for dynamically updating codewords based on the actual data encountered is invented. Pointer based encoding is invented in 1977 by Abraham Lempel and Jacob Ziv. LZW algorithm is invented in the mid-1980s, which became the method for most general purpose compression systems. It was used in programs, as well as in hardware devices such as modems [1]. In the early 1990s, lossy compression method is widely used. Today image compression standards include: FAX CCITT 3 (run-length encoding, with codewords determined by Huffman coding from a definite distribution of run lengths); BMP (run-length encoding, etc.); JPEG (lossy discrete cosine transform, then Huffman or arithmetic coding); GIF (LZW); TIFF (FAX, JPEG, GIF, etc.)[2]. Typical compression ratios currently achieved for text are around 3:1, and for photographic images around 2:1 lossless, and for line diagrams and text images around 3:1, and 20:1 lossy. Images on internet grow very fast and hence each server needs to store high volume of data about the images and images are one of the most important data about information. As a result servers have a high volume of images with them and require a huge hard disk space and transmission bandwidth to store these images. Most of the time transmission bandwidth is not sufficient for storing all the image data. Image compression is the process of encoding information using fewer bits. Compression is useful because it helps to reduce the consumption of expensive resources, such as transmission bandwidth or hard disk space. Compression scheme for image may require expensive hardware for the image to be decompressed fast enough to be viewed as its being decompressed [3]. Compression schemes therefore involves trade-offs among various factors, including the degree of compression, the amount of distortion introduced, and the computational resources required to compress and uncompress the data. Image compression is the application of Data compression. Image compression reduce the size in bytes of a graphics file without degrading the quality of the image. The purpose of reduction in file size allows more images to be stored in a given amount of disk or memory space. It also reduces the time required for images to be sent over the Internet or downloaded from Web pages. There are several different ways in which image files can be compressed. For Internet use, the two most common compressed graphic image formats are the JPEG format and the GIF format. The JPEG method is more often used for photographs, while the GIF method is commonly used for line art and other images in which geometric shapes are relatively simple [4-6]. Other techniques for image compression include the use of fractals and wavelets. These methods have not gained widespread acceptance for use on the Internet as of this writing. However, both methods offer promise because they offer higher compression ratios than the JPEG or GIF methods for some types of images. Another new method that
  • 2. International Journal of Electrical & Electronics Engineering 8 www.ijeee-apm.com may in time replace the GIF format is the PNG format [7]. With a compression ratio of 32:1, the space, bandwidth and transmission time requirements can be reduced by the factor of 32, with acceptable quality. Image compression and coding techniques explore three types of redundancies: A. Coding redundancy: Coding redundancy is present when less than optimal code words are used. This type of coding is always reversible and usually implemented using look up tables (LUTs) [8]. Examples of image coding schemes that explore coding redundancy are the Huffman codes and the arithmetic coding technique. B. Inter pixel redundancy: This type of redundancy sometimes called spatial redundancy, inter frame redundancy, or geometric redundancy. This redundancy can be explored in several ways, one of which is by predicting a pixel value based on the values of its neighboring pixels. In order to do so, the original 2-D array of pixels is usually mapped into a different format, e.g., an array of differences between adjacent pixels. If the original image pixels can be reconstructed from the transformed data set the mapping is said to be reversible. Examples of compression techniques that explore the interpixel redundancy include: Constant Area Coding (CAC), (1-D or 2-D) Run Length Encoding (RLE) techniques, and many predictive coding algorithms such as Differential Pulse Code Modulation (DPCM) [9]. C. Psycho visual redundancy: Many experiments on the psychophysical aspects of human vision have proven that the human eye does not respond with equal sensitivity to all incoming visual information; some pieces of information are more important than others. The knowledge of which particular types of information are more or less relevant to the final human user have led to image and video compression techniques that aim at eliminating or reducing any amount of data that is psycho visually redundant. The end result of applying these techniques is a compressed image file, whose size and quality are smaller than the original information, but whose resulting quality is still acceptable for the application at hand. The loss of quality that ensues as a byproduct of such techniques is frequently called quantization, as to indicate that a wider range of input values is normally mapped into a narrower range of output values thorough an irreversible process [10]. In order to establish the nature and extent of information loss, different fidelity criteria (some objective such as root mean square (RMS) error, some subjective, such as pair wise comparison of two images encoded with different quality settings) can be used. Most of the image coding algorithms in use today exploit this type of redundancy, such as the Discrete Cosine Transform (DCT)-based algorithm at the heart of the JPEG encoding standard. II. TECHNIQUES USED FOR IMAGE COMPRESSION A. Image Compression Model: Image compression system is composed of two distinct functional components: an encoder and a decoder. The encoder performs the complementary operation of compression, and the decoder performs the complementary operation of decompression. Both compression and decompression operations can be performed in software, as in the case in web browsers and many commercial image editing programs, or in a combination of hardware and firmware, as in commercial DVD players [11]. A codec is a device or program that is capable of both encoding and decoding. Input image f(x, y) is fed into the encoder, which creates a compressed representation of the input. This representation is stored for latter use, or transmitted for storage and use at a remote location. When the compressed representation is presentation is presented to its complementary decoder, a reconstructed output image f^(x, y) is generated. In general, f^(x,y) may or may not be a replica of f(x,y). If it is, the compression system is called error free, lossless or information preserving. If not, the reconstructed output image is distorted and the compression system is referred to as lossy. B. The encoding or compression process: The encoder is designed to remove the redundancies. In the first stage of the encoding process, a mapper transforms f(x, y) into a format designed to reduce spatial and temporal redundancy. This operation generally is reversible and may or may not reduce directly the amount of data required to represent the image. The run length coding is an example of the mapping that normally yields compression in the first step of encoding process. The quantizer reduces the accuracy of the mapper’s output in accordance with per-established fidelity criterion. The goal is to keep irrelevant information out of the compressed representation. This operation is irreversible. It must be omitted when error-free compression is desired. In the third and final stage of the encoding process, the symbol coder generates a fixed or variable length code to represent the quantizer output and maps the output in accordance with the code [12]. In many cases, a variable – length code is used. The shortest code words are assigned to the most frequently occurring quantizer output values- thus minimizing coding redundancy. This operation is irreversible. Upon its completion, the input image has been processed for the removal of each of the three redundancies (Coding, Interpixel , Psycho visual). C. The Decoding or decompression process: The decoder contains only two components: a symbol decoder and an inverse mapper. They perform, in reverse order, the inverse operation of encoder’s symbol encoder and mapper. Because quantization results in irreversible information loss, an inverse quantizer block is not included in the general decoder model [13]. D. Image Compression Algorithms: Image compression can be lossy or lossless. Lossless compression is sometimes preferred for artificial images such
  • 3. www.ijeee-apm.com International Journal of Electrical & Electronics Engineering 9 as technical drawings, icons or comics. This is because lossy compression methods, especially when used at low bit rates, introduce compression artifacts. Lossless compression methods may also be preferred for high value content, such as medical imagery or image scans made for archival purposes. Lossy methods are especially suitable for natural images such as photos in applications where minor (sometimes imperceptible) loss of fidelity is acceptable to achieve a substantial reduction in bit rate [14-15]. E. Various Lossy Compression Methods are: 1) Cartesian Perceptual Compression: Also known as CPC 2) DjVu 3) Fractal compression 4) HAM, hardware compression of color information used in Amiga computers 5) ICER, used by the Mars Rovers: related to JPEG 2000 in its use of wavelets 6) JPEG 7) JPEG 2000, JPEG's successor format that uses wavelets. 8) JBIG2 9) PGF, Progressive Graphics File (lossless or lossy compression) Wavelet compression. F. Various Loss-Less Compression Method are: 1) Run-length encoding – used as default method in PCX and as one of possible in BMP, TGA, TIFF 2) Entropy coding 3) Adaptive dictionary algorithms such as LZW – used in GIF and TIFF 4) Deflation – used in PNG, MNG and TIFF. G. The steps involved in compressing and decompressing of image are: 1) Specifying the Rate (bits available) and Distortion (tolerable error) parameters for the target image. 2) Dividing the image data into various classes, based on their importance. 3) Dividing the available bit budget among these classes, such that the distortion is a minimum. 4) Quantize each class separately using the bit allocation information derived in step 3. 5) Encode each class separately using an entropy coder and write to the file. 6) Reconstructing the image from the compressed data is usually a faster process than compression. The steps involved are step 7 to step 9. 7) Read in the quantized data from the file, using an entropy decoder. (Reverse of step 5). 8) Dequantized the data. (Reverse of step 4). 9) Rebuild the image. (Reverse of step 2). H. Calculation of image compression: There are various types of terms that are used in calculation of image compression. Some are listed below: a. Cartesian Perceptual Compression: Also known as CPC b. Compression Ratio = Uncompressed Size/Compressed Size c. Space Saving = [1- compressed Size/Uncompressed Size] d. Data Rate Savings = [1- compressed data rate/Uncompressed data rate] The PSNR is most commonly used as a measure of quality of reconstruction in image compression etc. It is most easily defined via the mean squared error (MSE) which for two m×n monochrome images I and K where one of the images is considered a noisy approximation of the other is defined as:       1 0 1 0 ),(),( 1 m i n j jiKjiI MN MSE 2 The PSNR is defined as:              MSE MAX MSE MAX PSNR 1 10 2 1 10 log20log10 Here, MAXi is the maximum possible pixel value of the image. When the pixels are represented using 8 bits per sample, this is 255. More generally, when samples are represented using linear PCM with B bits per sample, MAXI is 2B -1. Signal-to-noise ratio is a term for the power ratio between a signal (meaningful information) and the background noise: 2        Sinal Signal Noise Signal A A P P SNR If the signal and the noise are measured across the same impedance then the SNR can be obtained by calculating 20 times the base-10 logarithm of the amplitude ratio:              Noise Signal Noise Signal A A P P dbSNR 1010 log20log10)( The MSE of an estimator with respect to the estimated parameter θ is defined as: MSE ()=E((-)2) The MSE can be written as the sum of the variance and the squared bias of the estimator: MSE ()=Var()+(Bias(,))2 In a statistical model where the estimand is unknown, the MSE is a random variable whose value must be estimated. This is usually done by the sample mean, with θj being realizations of the estimator of size n. 2 1 '' )( 1 )(    n j j n MSE III. COMPRESSION TECHNOLOGIES A. All Block Truncation Coding: Block Truncation Coding (BTC) is a well known compression scheme proposed in 1979 for the greyscale. It
  • 4. International Journal of Electrical & Electronics Engineering 10 www.ijeee-apm.com was also called the moment preserving block truncation because it preserves the first and second moments of each image block. It is a lossy image compression technique. It is a simple technique which involves less computational complexity. BTC is a recent technique used for compression of monochrome image data. It is one-bit adaptive moment- preserving quantizer that preserves certain statistical moments of small blocks of the input image in the quantized output. The original algorithm of BTC preserves the standard mean and the standard deviation. The statistical overheads Mean and the Standard deviation are to be coded as part of the block. The truncated block of the BTC is the one-bit output of the quantizer for every pixel in the block [1]. B. Wavelet Transform: A wavelet image compression system can be created by selecting a type of wavelet function, quantizer, and statistical coder. The first step in wavelet compression are performing a discrete wavelet Transformation (DWT), after that quantization of the wavelet space image sub bands, and then encoding these sub bands. Wavelet images are not compressed images; rather it is quantization and encoding stages that do the image compression. Image decompression, or reconstruction, is achieved by carrying out the above steps in reverse and inverse order [4]. C. EZW Algorithm: In embedded coding, the coded bits are ordered in accordance with their importance and all lower rate codes are provided at the beginning of the bit stream. Using an embedded code, the encoder can terminate the encoding process at any stage, so as to exactly satisfy the target bit-rate specified by the channel. To achieve this, the encoder can maintain a bit count and truncate the bit-stream, whenever the target bit rate is achieved. Although the embedded coding used in EZW is more general and sophisticated than the simple bit-plane coding, in spirit, it can be compared with the latter, where the encoding commences with the most significant bit plane and progressively continues with the next most significant bit-plane and so on. If target bit-rate is achieved before the less significant bit planes are added to the bit-stream, there will be reconstruction error at the receiver, but the “significance ordering” of the embedded bit stream helps in reducing the reconstruction error at the given target bit rate [2]. D. Fractal Image Compression and Decompression: Fractal compression is a lossy image compression method using fractals to achieve high levels of compression. The method is best suited for photographs of natural scenes (trees, mountains, ferns, clouds). The fractal compression technique relies on the fact that in certain images, parts of the image resemble other parts of the same image. Fractal algorithms convert these parts, or more precisely, geometric shapes into mathematical data called "fractal codes" which are used to recreate the encoded image. Fractal compression differs from pixel-based compression schemes such as JPEG, GIF and MPEG since no pixels are saved. Once an image has been converted into fractal code its relationship to a specific resolution has been lost. The image can be recreated to fill any screen size without the introduction of image artifacts that occurs in pixel based compression schemes. IV.RESULTS Matlab approach has been implemented for compressing images. Matlab is capable of handling simultaneous multiple matrix of images. In this firstly given RGB image is divided into three matrices which are compressed individually and then these are merged together to construct final compressed image. Image processing tool box of matlab is used to perform all compression task. Matlab based environment ensures high scalability, availability and reliability through redundancy mechanisms. Hence matlab computing proves to be an appropriate platform for compressing images by various techniques. Matlab provides High-level language for technical computing and Development environment for managing code, files and data. It is an Interactive tool for iterative exploration, design and problem solving. It provides Mathematical functions for linear algebra, statistics, Fourier analysis, filtering, optimization, numerical integration and Tools for building custom graphical user interfaces. In this study compressing of images is taken by splitting image matrix into R,G,B matrix which are compressed individual and then these are merged for construction of compressed image. It is an efficient approach for performing compression for large size images of different format. Time and space is reduced to great extent with the help of Matlab computing. An RGB image, sometimes referred to as a true color image, is stored as an m-by-n-by-3 data array that defines red, green and blue color components for each individual pixel. RGB images do not use a palette. The colour of each pixel is determined by the combination of the red, green, and blue intensities stored in each colour plane at the pixel's location. Graphics file formats store RGB images as 24-bit images, where the red, green, and blue components are 8 bits each. This yields a potential of 16 million colours. A. Block Truncation Coding: In table 1 we take the block size of 8*8, 64*64 and perform block truncation coding. These results are shown in figure 1. Table 1: Block Truncation Coding Block Size 8*8 64*64 MSE 3.5077e+003 3.2613e+003 PSNR 12.6805 12.9969
  • 5. www.ijeee-apm.com International Journal of Electrical & Electronics Engineering 11 a)Original Image b) 8*8 Block Truncation c) 64*64 Block Truncation Fig. 1: Block Truncation Coding B. Wavelet Compression: In table 2 Wavelet Compression encode time, MSE and PSNR is shown with Decomposition Level 3 and 7. Figure 2 shows results for Wavelet Compression. Table 2: Wavelet Compression Decom. Level 4 7 Encode time 35.188 Sec. 35.359 Sec. MSE 3.5609e+003 3.6379e+003 PSNR 12.6152 12.5224 a) Original b) Level 4 c) Level 7 Fig. 2: Wavelet Compression C. Embedded Zerotree: In table 3 Embedded Zerotree encode time, decode time, MSE and PSNR is shown with decomposition level 4 and 6. Figure 3 shows the results for Embedded Zerotree. Table 3:Embedded Zerotree Decom. Level 4 6 Encode time 237.7180 Sec. 243.8910 Sec. Decode time 119.9070 Sec. 123.4360 Sec. MSE 3.4228e+003 3.4228e+003 PSNR 12.7870 12.7870 a) Original b) Level 4 c) Level 6 Fig. 3: Embedded Zerotree D. Fractal Image Compression: In table 4 Fractal Image Compression encode time, decode time, MSE and PSNR is shown with increase in block size of 10 and 25. Figure 4 shows the results for Fractal Image Compression. Table 4:Embedded Zerotree Decom. Level 4 25 Encode time 300.0610 Sec. 302.310 Sec. Decode time 41.0320 Sec. 40.703 Sec. MSE 3.5205e+003 2.9751e+003 PSNR 12.6648 13.3957 a) Original b) Block Size 2 c) Block Size 25 Fig. 4: Embedded Zerotree Fig. 5 Flowchart for implementation of compressing image in matlab Environment Different types of image are taken for discussing their results. In our study four different types of images are taken:
  • 6. International Journal of Electrical & Electronics Engineering 12 www.ijeee-apm.com a. Face image Encode Process Time as Second of red =95.9850 Decode Process Time as Second of red =13.5620 Encode Process Time as Second of green =98.1410 Decode Process Time as Second of green =13.7970 Encode Process Time as Second of blue =96.9690 Decode Process Time as Second of blue =13.6560 Total encode time =291.0950 Total decode time =41.0150 Cr =6.2036 Encode_time =291.095seconds The MSE performance is 56.72 dB The psnr performance is 30.59 dB Fig. 6 Face Image b. Scene image: Encode Process Time as Second of red =97.8600 Decode Process Time as Second of red =13.5630 Encode Process Time as Second of green =95.1560 Decode Process Time as Second of green =13.4220 Encode Process Time as Second of blue =95.9370 Decode Process Time as Second of blue =13.4690 Total encode time =288.9530 Total decode time =40.4540 Cr =1.0033 Encode time =288.953seconds The MSE performance is 10.65 dB The psnr performance is 37.86 dB Fig. 7 Scene image V. CONCLUSIONS Images play an important role in our lives. They are used in many applications. In our study we have applied different type of compression technique on different type of images for a PSNR value and compression ratio. In this paper, the problem of compressing an image in Matlab environment has been taken. A matlab compression approach has been implemented for compressing images. After analysis we have found that, scene Images Wavelet provides the better result but compression ratio is high in case of BTC and visual quality is better of BTC. For face Images BTC perform the most compression. FIC provide almost same result as compare to BTC, but fractal image compression take a long time for compression, so we can use BTC as compare to FIC when time in main concern. We analyzed the PSNR obtained of compressed after each compression technique and decides which technique can provide maximum PSNR for a particular image. We have done PSNR measures, but should also use objective and subjective picture quality measures. The objective measures such as PSNR and MSE do not correlate well with subjective quality measures. Therefore, we should use PQS as an objective measure that has good correlation to subjective measurements. After this we will have an optimal system having best compression ratio with best image quality. REFERENCES [1]. A. Kumar, P. Singh, “Comparative study of Block Truncation Coding with EBTC”, International Journal of Advances in Computer Networks and its Security, pp: 395-405, 2011. [2]. D. Mohammed, F. Abou-Chadi, “Image Compression Using Block Truncating Code”, JSAT, pp 9 – 1, 2011. [3]. Q. Guan, “Research of Image Compression Based on Embedded Zero-tree Wavelet Transform”, IEEE, pp: 591-595, 2011. [4]. S. A. Abdul, k. B. A. Karim,” Wavelet transform and fast Fourier transform for signal compression: a comparative study”, 2011 international conference on electronic devices, systems and applications, IEEE, pp: 280-285, 2011. [5]. P. aggarwal, B. Rani, “Performance Comparison of Image Compression Using Wavelets”, IJCSC, IEEE, pp: 97-100, 2010. [6]. Chunlei Jiang, Shuxin Yin,”A Hybrid Image Compression Algorithm Based on Human Visual System” International Conference on Computer Application and System Modeling, IEEE, pp: 170-173, 2010. [7]. L. Hengjian, W. Jizhi, W. Yinglong, T. Min, X. Shujiang, “A flexible and secure image compression coding algorithm”, International Conference on Future Information Technology and Management Engineering, IEEE, pp: 376-379, 2010. [8]. S.P. Raja, A. Suruliandi, “Analysis of Efficient Wavelet based Image Compression Techniques”, Second International conference on Computing, Communication and Networking Technologies, IEEE, pp: 1-6, 2010. [9]. Shukla, M. Alwani, A. K. Tiwari, “A survey on lossless image compression methods” 2nd international conference on computer engineering and technology, IEEE vol 6, pp: 136-141, 2010. [10]. X. Wu, W. Sun “Data Hiding in Block Truncation Coding”, International Conference on Computational Intelligence and Security, IEEE, pp: 406-410, 2010. [11]. T. Y. Mei, T. J. Bo, “A Study of Image Compression Technique Based on Wavelet Transform”, Fourth International Conference on Genetic and Evolutionary Computing 2010 IEEE, 2010. [12]. J. Bhattacharjee, “A Comparative study of Discrete Cosine Transformation, Haar Transformation, Simultaneous Encryption and Compression Techniques, International Conference on Digital Image Processing”, ICDIP, 2009 Proceedings of the International Conference on Digital Image Processing, Pages 279-283,2009. [13]. B. Rani, R. K. Bansal and S. Bansal , “Comparison of JPEG and SPIHT Image Compression Algorithms using Objective Quality Measures” , Multimedia, Signal Processing and Communication Technologies, IMPACT 2009, IEEE, 2009, Page no 90-93, 2009. [14]. V. P. Lineswala , J. N. patel, “JPEG image compression and transmission over wireless channel”, International Conference on Advances in Computing, Control, and Telecommunication Technologies, IEEE, pp: 643-645, 2009. [15]. M. Grossber, I. Gladkova, S. Gottipat , M. Rabinowitz, P. Alabi, T. George1, and A.Pacheco, “A Comparative Study of Lossless Compression Algorithms on Multi-Spectral Imager Data”, Data Compression Conference, IEEE, pp:447, 2009.
  • 7. www.ijeee-apm.com International Journal of Electrical & Electronics Engineering 13 AUTHORS First Author– Abhishek Thakur: M. Tech. in Electronics and Communication Engineering from Punjab Technical University, MBA in Information Technology from Symbiosis Pune, M.H. Bachelor in Engineering (B.E.- Electronics) from Shivaji University Kolhapur, M.H. Five years of work experience in teaching and one year of work experience in industry. Area of interest: Digital Image and Speech Processing, Antenna Design and Wireless Communication. International Publication: 7, National Conferences and Publication: 6, Book Published: 4 (Microprocessor and Assembly Language Programming, Microprocessor and Microcontroller, Digital Communication and Wireless Communication). Working with Indo Global College of Engineering Abhipur, Mohali, P.B. since 2011. Email address: abhithakur25@gmail.com Second Author – Rajesh Kumar is working as Associate Professor at Indo Global College of Engineering, Mohali, Punjab. He is pursuing Ph.D from NIT, Hamirpur, H.P. and has completed his M.Tech from GNE, Ludhiana, India. He completed his B.Tech from HCTM, Kaithal, India. He has 11 years of academic experience. He has authored many research papers in reputed International Journals, International and National conferences. His areas of interest are VLSI, Microelectronics and Image & Speech Processing. Third Author – Amandeep Batth: M. Tech. in Electronics and Communication Engineering from Punjab Technical University, MBA in Human Resource Management from Punjab Technical University , Bachelor in Technology (B-Tech.) from Punjab Technical University . Six years of work experience in teaching. Area of interest: Antenna Design and Wireless Communication. International Publication: 1, National Conferences and Publication: 4. Working with Indo Global College of Engineering Abhipur, Mohali, P.B. since 2008. Email address: amandeep_batth@rediffmail.com Forth Author – Jitender Sharma: M. Tech. in Electronics and Communication Engineering from Mullana University, Ambala, Bachelor in Technology (B-Tech.)from Punjab Technical University . Five years of work experience in teaching. Area of interest:, Antenna Design and Wireless Communication. International Publication: 1 National Conferences and Publication:6 and Wireless Communication). Working with Indo Global college since 2008. E-mail address:er_jitender2007@yahoo.co.in