An Efficient Spatial Prediction-Based Image Compression Scheme

Slides:



Advertisements
Similar presentations
Scalable Video Multicast Using Expanding Window Fountain Codes Dejan Vukobratovic´,Vladimir Stankovic´, Dino Sejdinovic´, Lina Stankovic´,Zixiang Xiong.
Advertisements

Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Adaptive Context-Based Arithmetic Coding of Arbitrary Contour Maps Armando J. Pinho IEEE SIGNAL PROCESSING LETTERS, VOL. 8, NO. 1,JANUARY 2001.
1 Outline  Introduction to JEPG2000  Why another image compression technique  Features  Discrete Wavelet Transform  Wavelet transform  Wavelet implementation.
Video Coding with Spatio-temporal Texture Synthesis and Edge-based inpainting Chunbo Zhu, Xiaoyan Sun, Feng Wu, and Houqiang Li ICME 2008.
Efficient Moving Object Segmentation Algorithm Using Background Registration Technique Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, Fellow, IEEE Hsin-Hua.
1 Static Sprite Generation Prof ︰ David, Lin Student ︰ Jang-Ta, Jiang
Error Concealment For Fine Granularity Scalable Video Transmission Hua Cai; Guobin Shen; Feng Wu; Shipeng Li; Bing Zeng; Multimedia and Expo, Proceedings.
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
Image Compression - JPEG. Video Compression MPEG –Audio compression Lossy / perceptually lossless / lossless 3 layers Models based on speech generation.
Image Watermarking For Tampering Protection and Self-Recovery
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
A Memory-efficient Huffman Decoding Algorithm
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
A Robust Luby Transform Encoding Pattern-Aware Symbol Packetization Algorithm for Video Streaming Over Wireless Network Dongju Lee and Hwangjun Song IEEE.
MPEG4 Fine Grained Scalable Multi-Resolution Layered Video Encoding Authors from: University of Georgia Speaker: Chang-Kuan Lin.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
SPIHT algorithm combined with Huffman encoding Wei Li, Zhen Peng Pang, Zhi Jie Liu, 2010 Third International Symposium on Intelligent Information Technology.
SIMD Implementation of Discrete Wavelet Transform Jake Adriaens Diana Palsetia.
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Der-Chyuan Lou and Jiang-Lung Liu,
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Reporter :Liang, Min-Chen Date :2003/04/15
Lossy Compression of DNA Microarray Images
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Source :Journal of visual Communication and Image Representation
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Hiding Data in a Color Palette Image with Hybrid Strategies
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
An efficient reversible data hiding method for AMBTC compressed images
Source: Information Sciences, 2018, accpeted.
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Dynamic embedding strategy of VQ-based information hiding approach
Chair Professor Chin-Chen Chang Feng Chia University
Hung, K. -L. and Chang, C. -C. , IEE Image and Signal Processing, vol
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
An Algorithm for Compression of Bilevel Images
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Hung, K. -L. and Chang, C. -C. , IEE Image and Signal Processing, vol
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
An Algorithm for Removable Visible Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: IEEE Transactions on Circuits and Systems,
Using Association Rules as Texture features
A Fast No Search Fractal Image Coding Method
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Source : Digital Signal Processing. Vol. 73, pp , Feb
Sourse: arXiv preprint, arXiv: , 2018 (Submit to IEEE Trans
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Source: Circuits and Systems for Video Technology,
Presentation transcript:

An Efficient Spatial Prediction-Based Image Compression Scheme Chin-Hwa Kuo, Tzu-Chuan Chou, and Tay-Shen Wang, IEEE Transactions on Circuits and System for Video Technology, Vol.12, No.10, October 2002, pp. 850-856 Advisor : Prof. Chang, Chin-Chen Speaker: Lee, Jiau-Yun Date : 2003/6/3

Outline Introduction Spatial Prediction-Based Image Compression Proposed Spatial-Prediction Scheme Experimental Results Conclusions

Introduction DWT has become the important technology of image compression. ESPIC can fit for the application to real-time and wireless multimedia environment.

The Typical Spatial Coding System Symbol encoder compressed image + - Input image Nearest integer predictor decompressed image Compressed image Symbol decoder + predictor Prediction error

Spatial Prediction-Based Image Compression The typical spatial coding system can’t use all pixel to predict. We break the limit and extend to lossy image compression. c b a x

Proposed Spatial-Prediction Scheme(ESPIC) The design efficient spatial prediction-based image compression(ESPIC) consists two phases: Phase1---Prediction Construct hierarchical structure Prediction scheme Phase2---Quantization

Construct Hierarchical Structure Step1:mark position as n (row num.+column num.=even) Step2:mark position as n+1 (row num. :even & column num. :odd) preprocess: Set all pixels as 0 and n=1 0 1 2 3 4 5 6 7 1 2 1 2 3 4 5 6 7

Construct Hierarchical Structure(Cont.) 0 1 2 3 4 5 6 7 1 2 3 4 5 6 1 2 3 4 5 6 7 Step3: collect still marked as 0 and combine them into a new small image Step4: reassign new row and column num. Step5: n=n+2 go to step1 0 1 2 3 3 4 1 2 3 5 6

Construct Hierarchical Structure(Cont.) temporary map 1 2 3 4 5 6 Level4 Level3 Level2 Level1 5 5 6 4 4 4 4 3 3 3 3 1 1 1 1 2 2 2 2 Position number 1 32 2 16 3 8 4 4 5 2 6 1

Prediction Scheme---Mark Number n is odd number: n+1: <temporary map>

Example---Sender <original> 1 2 3 4 5 6 7 1 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 1 2 3 4 5 6 7 100 120 80 70 90 200 50 220 110 60 30 1 2 1 2 3 4 5 6 7 10 32.5 17.5 40 37.5 62.5 55 -7.5 -5 -12.5 -40 -42.5 -20 -25 15 57.5 87.5 -57.5 -105 -52.5 -102.5 -35 -80 -82.5 70 100 -15 -30 7.5 -2.5 -22.5 1 2 3 4 5 6 7 0 = 80-(1/4(100+80+70+70)) -102.5 = 50-(1/4(90+220+100+200))

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 1 2 3 4 5 6 7 100 120 80 70 90 200 50 220 110 60 30 1 2 3 4 5 6 7 1 2 3 4 3 4 10 32.5 17.5 40 37.5 62.5 55 2.5 -25 -17.5 -7.5 -5 -12.5 -40 -42.5 -20 15 57.5 80 87.5 -57.5 -105 -52.5 -102.5 -35 -80 -82.5 102.5 70 125 100 -37.5 5 -15 -30 7.5 -2.5 -22.5 1 2 3 4 5 6 7 -12.5=90-(1/4(70+90+220+200)) 5=100-(1/4(200+90+60+30))

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 1 2 3 4 5 6 7 100 120 80 70 90 200 50 220 110 60 30 1 2 3 4 5 6 7 1 2 3 4 5 6 3 4 10 32.5 17.5 40 37.5 62.5 55 2.5 -25 -17.5 -7.5 -5 -12.5 -40 -42.5 -20 15 140 57.5 80 87.5 -57.5 -105 -52.5 -102.5 -35 -80 -82.5 102.5 70 125 100 -37.5 5 -15 -30 7.5 -2.5 60 -22.5 -100 5 6 1 2 3 4 5 6 7 -40=90-(1/2(200+60)) 140=200-60

Example---Receiver 1 2 3 4 5 6 7 1 2 3 4 5 6 7 5 6 200 = 60+140 0 1 2 3 4 5 6 7 1 2 3 4 5 6 1 2 3 4 5 6 7 10 32.5 17.5 40 37.5 62.5 55 2.5 -25 -17.5 -7.5 -5 -12.5 -40 -42.5 -20 15 140 57.5 80 87.5 -57.5 -105 -52.5 -102.5 -35 -80 -82.5 102.5 70 125 100 -37.5 5 -15 -30 7.5 -2.5 60 -22.5 -100 1 2 3 4 5 6 7 3 4 0 1 2 3 4 5 6 7 1 2 3 4 5 6 7 90 200 60 30 5 6 200 = 60+140 90 = -40+(1/2(60+200))

10 32.5 17.5 40 37.5 62.5 55 2.5 -25 -17.5 -7.5 -5 -12.5 -40 -42.5 -20 15 140 57.5 80 87.5 -57.5 -105 -52.5 -102.5 -35 -80 -82.5 102.5 70 125 100 -37.5 5 -15 -30 7.5 -2.5 60 -22.5 -100 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 0 1 2 3 4 5 6 7 1 2 3 4 5 6 7 70 90 200 220 100 60 30 3 4 220 = 125+ (1/4(90+60+30+200))

Quantization The higher level pixels affect more pixels They have higher significance. The hierarchy is similar to the hierachy made by DWT. The authors combine prediction scheme and SPIHT algorithm. It can use progressive codec.

Quantization Round1: pass 60,140,0,0 … 1 2 3 4 5 6 7 10 32.5 17.5 40 37.5 62.5 55 2.5 -25 -17.5 -7.5 -5 -12.5 -40 -42.5 -20 15 140 57.5 80 87.5 -57.5 -105 -52.5 -102.5 -35 -80 -82.5 102.5 70 125 100 -37.5 5 -15 -30 7.5 -2.5 60 -22.5 -100 1 2 3 4 5 6 7 Round1: pass 60,140,0,0 …

Experimental Results

Experimental Results(Cont.)

Conclusions The ESPIC scheme has compression efficiency and progressive coding. The developed scheme is benefit to the application of real-time and wireless image transmission.