Chair Professor Chin-Chen Chang Feng Chia University

Slides:



Advertisements
Similar presentations
A Secret Information Hiding Scheme Based on Switching Tree Coding Speaker: Chin-Chen Chang.
Advertisements

CSE 589 Applied Algorithms Spring 1999 Image Compression Vector Quantization Nearest Neighbor Search.
Vector Quantization. 2 outline Introduction Two measurement : quality of image and bit rate Advantages of Vector Quantization over Scalar Quantization.
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
Date: Advisor: Jian-Jung Ding Reporter: Hsin-Hui Chen.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
A Fast LBG Codebook Training Algorithm for Vector Quantization Presented by 蔡進義.
Image Compression Using Address-Vector Quantization NASSER M. NASRABADI, and YUSHU FENG Presented by 蔡進義 P IEEE TRANSACTIONS ON COMMUNICATIONS,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
S.R.Subramanya1 Outline of Vector Quantization of Images.
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
影像偽裝術 Dr. Chin-Chen Chang
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
An Image Database Retrieval Scheme Based Upon Multivariate Analysis and Data Mining Presented by C.C. Chang Dept. of Computer Science and Information.
A Secret Information Hiding Scheme Based on Switching Tree Coding
Image Compression using Vector Quantization
A New Classification Mechanism for Retinal Images
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Chapter 3 向量量化編碼法.
A New Image Compression Scheme Based on Locally Adaptive Coding
Source: ACM International Conference Proceding
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Chair Professor Chin-Chen Chang Feng Chia University
Source :Journal of visual Communication and Image Representation
Chair Professor Chin-Chen Chang Feng Chia University
High-capacity image hiding scheme based on vector quantization
Advisor: Chin-Chen Chang1, 2 Student: Wen-Chuan Wu2
指導教授: Chang, Chin-Chen (張真誠)
A Data Hiding Scheme Based Upon Block Truncation Coding
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An Innovative Steganographic Scheme Based on Vector Quantization
A Restricted Region-based Data-hiding Scheme
An Innovative Steganographic Scheme Based on Vector Quantization
Some Novel Steganographic Methods for Digital Images
第 四 章 VQ 加速運算與編碼表壓縮 4-.
Reversible Data Hiding Scheme Using Two Steganographic Images
Density-Based Image Vector Quantization Using a Genetic Algorithm
Information Steganography Using Magic Matrix
Dynamic embedding strategy of VQ-based information hiding approach
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Chair Professor Chin-Chen Chang Feng Chia University
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Virtual Image Cryptosystem Based upon Vector Quantization
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Information Hiding Techniques Using Magic Matrix
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A New Image Compression Scheme Based on Locally Adaptive Coding
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Lossless Compression Schemes of Vector Quantization Indices Using State Codebook Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University http://msn.iecs.fcu.edu.tw/~ccc

Outline Introduction Proposed schemes Experimental results Conclusions VQ PCA SOC Proposed schemes Scheme 1 Scheme 2 Experimental results Conclusions

Alan Chang

Vector Quantization (VQ) Concept Encoding and Decoding

Introduction (VQ) Image compression technique w h Image Index table Vector Quantization Encoder

Introduction (VQ) (Cont.)

Introduction (VQ) (Cont.) Training phase Codebook ………………. …...…. Codebook size ex : 128, 256, 512 or 1024 divided into blocks with pixels 16-dimension

Introduction (VQ) (Cont.) Training set Training using iteration algorithm Codebook Ci 1 . 254 255 (1, 2, 5, 9, 45, …) (101, 179, 201, …) (8, 27, 38, 19, 200, …) (23, 0, 67, 198, 224, …) Index sets New Codebook Ci+1 Compute mean values Replace the old vectors N-1

Introduction (VQ) (Cont.) LBG Algorithm 一次訓練 256 個 codewords 做了100次 連續兩次 MSE 之差別已經夠小

Ex: Codebook To encode an input vector, for example, v = (150,145,121,130) (1) Compute the distance between v with all vectors in codebook d(v, cw1) = 114.2 d(v, cw2) = 188.3 d(v, cw3) = 112.3 d(v, cw4) = 124.6 d(v, cw5) = 122.3 d(v, cw6) = 235.1 d(v, cw7) = 152.5 d(v, cw8) = 63.2 (2) So, we choose cw8 to replace the input vector v.

Introduction (VQ) (Cont.) Encoding Codebook 1 2 3 4 5 6 Nc-1 Nc Original image encoding index table

Introduction (VQ) (Cont.) Decoding look-up procedure Codebook 1 2 3 4 5 6 Nc-1 Nc decoding index table

Introduction (PCA) Principal component analysis (PCA) Ex: 2-dimension . D2 . . . . . . . . . . . . X1 . . . . . . . . . . .

Introduction (SOC) Search-order coding (SOC) Ex:

Introduction (SOC) (Cont.) Searched point Non-searched point

Introduction (SOC) (Cont.) The compressing steps Indicator P1 = 1 00011111 P2 = 1 11001111 P3 = 0 00 P6 = 0 01 31 207 211 8 7 35 … … Compression codes = 100011111 111001111 000 …

The proposed scheme start PCA SOC run SOC our scheme our scheme yes run SOC end our scheme no yes our scheme end original index value no original index value end

The proposed scheme (Cont.) Indicator SOC  “0” Our scheme  “10” Original index value  “11”

The proposed scheme (Cont.) State codebook is generated in real-time Three cases CASE 1 One-bit indicator (0)+ SOC CASE 2 Two-bits indicator (10)+ index value CASE 3 Two-bits indicator (11)+ VQ index value

The proposed scheme (Cont.) Example 1: 54 61 CASE 1 One-bit indicator (0)+ SOC Compression result of (3,3) is “0001” SOC: (101) 61 (001) (010) 54 (100) (000)

Scheme 1 CASE 2 Two-bits indicator (10)+ index value Example: 2 61 Compression result of (3,3) is “101110”

Scheme 1 (Cont.) Example 3: 60 61 Two-bits indicator (11) + VQ index CASE 3 No match found in Cases 1 and 2 Two-bits indicator (11) + VQ index “1110” 47

Scheme 2 Also called “The Optimized State Codebook Scheme” The exclusion of repetition indices Four state codebooks 61 Codebook 1

Scheme 2 (Cont.) Codebook 2 ? Check if {53, 54, 56, 57} ∩{52, 53, 55, 56} = ø 61 Yes: The similar neighboring index (2,2), which equals to “54” The index of the state codebook The indices of the closest codewords of “54” in the codebook “0100” “0101” “0110” “0111 52 53 55 56 NO: The similar neighboring index (2,2), which equals to “54” The index of the state codebook The indices of the closest codewords of “54” in the codebook “0100” “0101” “0110” “0111 51 52 58 59 52 53 55 56 53 54 56 57

Scheme 2 (Cont.) Codebook 3 ? Check if ({53, 54, 56, 57} ∪ {51, 52, 58, 59}) ∩ {50, 51, 53, 54} = ø Yes: 61 The similar neighboring index (2,4), which equals to “52” The index of the state codebook The indices of the closest codewords of “52” in the codebook “1000” “1001” “1010” “1011” 50 51 53 54 NO: 51 52 . 58 59 The similar neighboring index (2,4), which equals to “52” The index of the state codebook The indices of the closest codewords of “52” in the codebook “1000” “1001” “1010” “1011” 49 50 60 61 50 51 53 54

Scheme 2 (Cont.) Codebook 3 CASE 2 The similar neighboring index (2,4), which equals to “52” The index of the state codebook The indices of the closest codewords of “52” in the codebook “1000” “1001” “1010” “1011” 49 50 60 61 61 CASE 2 Two-bits indicator (10)+ index value Compression results of (3,3)= “10 1010”

Scheme 2 (Cont.) Codebook 4 ? Check if ({53, 54, 56, 57} ∪ {51, 52, 58, 59} ∪ {49, 50, 61, 62}) ∩ {44, 45, 47, 48} = ø Yes: 61 The similar neighboring index (3,1), which equals to “46” The index of the state codebook The indices of the closest codewords of “46” in the codebook “1100” “1101” “1110” “1111” 44 45 47 48

Experimental results (1/4) The codebook is designed by using LBG algorithm

Experimental results (2/4) 1

Experimental results (3/4) 2

Experimental results (4/4) 3

Conclusions Two new schemes for VQ index table Scheme 2 excludes the repetitive indices Scheme 2 presents better performance than SOC and Scheme 1 Both schemes achieve the goal of reducing bit rate