1 A JPEG-LS Based Lossless/Lossy Compression Method for Two-Dimensional Electrophoresis Images Source: 2003 International Conference on Informatics, Cybernetics,

Slides:



Advertisements
Similar presentations
Fig. 4-1, p Fig. 4-2, p. 109 Fig. 4-3, p. 110.
Advertisements

1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Secure Layer Based Compound Image Compression using XML Compression Author : D. Maheswari 1, V.Radha Source : Computational Intelligence and Computing.
P.464. Table 13-1, p.465 Fig. 13-1, p.466 Fig. 13-2, p.467.
Fig. 11-1, p p. 360 Fig. 11-2, p. 361 Fig. 11-3, p. 361.
Skills: none Concepts: the amount of information in an image This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License.
Table 6-1, p Fig. 6-1, p. 162 p. 163 Fig. 6-2, p. 164.
IMPROVING THE PERFORMANCE OF JPEG-LS Michael Syme Supervisor: Dr. Peter Tischer.
On the following slides some examples from various digital library pages are shown These examples show that the traditional compression techniques are.
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
1 Lossless DNA Microarray Image Compression Source: Thirty-Seventh Asilomar Conference on Signals, Systems and Computers, Vol. 2, Nov. 2003, pp
Teacher : Hsien-Chu Wu Student : Hsiao-yun Tseng, Chen-ying Lai Speaker : Hsiao-yun Tseng Date : May 10, 2006 Database Temper Detection Techniques Based.
A Low-Power CAM Design for LZ Data Compression Kun-Jin Lin and Cheng-Wen Wu, IEEE Trans. On computers, Vol. 49, No. 10, Oct Presenter: Ming-Hsien.
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Reversible Image Watermarking Using Interpolation Technique Source: IEEE Transcation on Information Forensics and Security, Vol. 5, No. 1, March 2010 Authors:
Context-based, Adaptive, Lossless Image Coding (CALIC) Authors: Xiaolin Wu and Nasir Memon Source: IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 45, NO. 4,
Improvements to the JPEG-LS prediction scheme Authors: S. Bedi, E. A. Edirisinghe, and G. Grecos Source : Image and Vision Computing. Vol. 22, No. 1, 2004,
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
1 A Gradient Based Predictive Coding for Lossless Image Compression Source: IEICE Transactions on Information and Systems, Vol. E89-D, No. 7, July 2006.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 Compression and Storage Schemes in a Sensor Network with Spatial and Temporal Coding Techniques You-Chiun Wang, Yao-Yu Hsieh, and Yu-Chee Tseng IEEE.
MPEG4 Fine Grained Scalable Multi-Resolution Layered Video Encoding Authors from: University of Georgia Speaker: Chang-Kuan Lin.
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
NCHU1 The LOCO-I Lossless image Compression Algorithm: Principles and Standardization into JPEG-LS Authors: M. J. Weinberger, G. Seroussi, G. Sapiro Source.
Compression and Security of Surveillance Videos Exercise 6 – Shot Change Detection M 陳威佑.
Information Systems Design and Development Media Types Computing Science.
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
A new approach to detect similar proteins from 2D gel electrophoresis images Nawaz Khan and Shahedur Rahman Proceedings of the Third IEEE Symposium on.
Picture with at least 1000x1000 pixels size
Introduction; font size
Source: Pattern Recognition, 37(5), P , 2004
Picture with at least 1500x1500 pixels size
Raster Images CPSC 1030.
Introduction; font size
Lossy Compression of DNA Microarray Images
Image camouflage by reversible image transformation
File size and image quality
Source : Signal Processing, Volume 133, April 2017, Pages
TITLE Authors Institution RESULTS INTRODUCTION CONCLUSION AIMS METHODS
Introduction; font size 12
Picture with at least 1000x1000 pixels size
An efficient reversible data hiding method for AMBTC compressed images
Picture with at least 1000x1000 pixels size
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels Source: Journal of Visual Communication and.
Dynamic embedding strategy of VQ-based information hiding approach
Source: Pattern Recognition Letters, Article In Press, 2007
E – POSTER COMPETITION “INNOVATIONS IN THE TREATMENT OF ALZHEIMERS”
Partial reversible data hiding scheme using (7, 4) hamming code
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Introduction; font size 12
Introduction; font size 12
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Progressive Transmission of Two-Dimensional Gel Electrophoresis Image Based on Context Features and Bit-plane Method Source:2004 IEEE International Conference.
Source: Pattern Recognition Letters 29 (2008)
Source: Signal Processing: Image Communication 16 (2001) pp
Partial reversible data hiding scheme using (7, 4) hamming code
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Introduction; font size 12
An Iterative Method for Lossless Data Embedding in BMP Images
Picture with at least 1500x1500 pixels size
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Picture with at least 1500x1500 pixels size
Presentation transcript:

1 A JPEG-LS Based Lossless/Lossy Compression Method for Two-Dimensional Electrophoresis Images Source: 2003 International Conference on Informatics, Cybernetics, and Systems Authors: Kevin I-J Ho, Tung-Shou Chen, Hui-Fang Tsai, Mingli Hsieh, and Chia-Chun Wu Speaker: Chia-Chun Wu ( 吳佳駿 ) Date: 2004/12/09

NCHU 2 Outline  Introduction Introduction  Schema Schema  Compression Method Compression Method  Decompression Method Decompression Method  Results Results  Conclusion Conclusion

NCHU 3  We use Lossless and Near-Lossless compress the important areas and unimportant areas in Two-Dimensional Electrophoresis (2D-Gel) images.  Our system improves traditional JPEG-LS to enhancing the compressed image quality. Introduction

NCHU 4 Schema (1/2)  Compression flow chart 3 Original 2D-Gel Image Detect Protein ’ s Areas 1 Record Boolean Value of Important Areas 2 JPEG-LS Near-Lossless Compress 5 4 Write Difference Value of Original Image’s Important Areas Difference value Record File Near-Lossless Compressed File

NCHU 5  Decompression flow chart Add Difference to Image’s Pixel Value Add Difference to Image’s Pixel Value Keep Important Information of 2D-Gel Image JPEG-LS Near-Lossless Decompress Near-Lossless Compressed File Difference value Record File Near-Lossless Decompressed 2D-Gel Image Schema (2/2)

NCHU 6 Compression Method (1/5)  Original 2D-Gel image - This is an original 2D-Gel image. X-axis represented the PH value of protein and Y-axis represented the amount molecular weight. Fig. 1 Original 2D-Gel image X-axis Y-axis

NCHU 7 Compression Method (2/5)  Fetching protein’s area. - To collect the important protein ‘s areas of 2D-Gel image. The colourful areas will treat as important areas, and white areas will treat as unimportant areas. Fig. 2 The important part of 2D-Gel image

NCHU 8 Compression Method (3/5)  Transform the important parts to Boolean value - Boolean value True(1) represents important areas, whereas False (0) represents unimportant areas. Fig. 3 Boolean value record file of important part

NCHU 9 Compression Method (4/5)  Image after JPEG-LS Near-Lossless compression - This is an 2D-Gel image after traditional JPEG-LS Near-Lossless compression. Fig. 4 Image after JPEG-LS Near-Lossless compression

NCHU 10 Compression Method (5/5)  Difference value records important part - The difference value of 2D- Gel image via the original image and lossless compression will store in a record file. Fig.5 Difference value record file

NCHU 11 Compression Example Original 2D-Gel Image Image after JPEG-LS Near-Lossless compression Difference value record file - =

NCHU 12 Decompression Method (1/3) Fig 6.Image after JPEG-LS Near-Lossless compression  The image of Near-Lossless decompression - This is a decompressed image after traditional JPEG-LS Near- Lossless compression

NCHU 13 Decompression Method (2/3)  Modify the protein’s area of important part - Next, we base on the difference value of pixels for modifying the protein’s area of important parts. Fig. 7 Difference value record file

NCHU 14 Decompression Method (3/3) Fig. 8 Our system’s lossless compression of important part.  The lossless image of our system’s important areas - This complete 2D-Gel image is though traditional JPEG-LS Near-Lossless compression technique

NCHU 15 Decompression Example Image after JPEG-LS Near-Lossless compression Difference value record file Our system’s lossless compression of important part + =

NCHU 16 Results (1/4) Fig. 9 Partial magnify image of original 2D-Gel image  Fig. 9 is the result of the amplification of dotted frame in Fig. 1.

NCHU 17 Fig. 10 Partial magnify image of traditional JPEG-LS. Results (2/4)  Fig.10 is the result of the amplification of dotted frame in Fig. 4.

NCHU 18 Fig. 11 Partial magnify image of our system. Results (3/4)  Fig. 11 is the result of the amplification of dotted frame in Fig. 8.

NCHU 19 Result (4/4) Table 1. The Comparison of image quality in traditional JPEG-LS Near-Lossless with our system (PSNR value). Unit:dB Results (4/4)

NCHU 20 Conclusion  We store the unimportant areas by Near-Lossless method. But we store important areas by Lossless method. It is very important to medical images.  Under different lossless level, we can find out our system has better image quality than traditional JPEG-LS.  Therefore, how to compress the size of record file and detect the protein’s location more correctly becoming an important topic in the future.