block truncation coding (BTC) is a successful image compression technique due to its simple and fast computational burden. The bit rate is fixed to 2.0 bits/pixel, whose performance is moderate in terms of compression...
详细信息
block truncation coding (BTC) is a successful image compression technique due to its simple and fast computational burden. The bit rate is fixed to 2.0 bits/pixel, whose performance is moderate in terms of compression ratio compared to other compression schemes such as discrete cosine transform (DCT), vector quantization (VQ), wavelet transform coding (WTC), etc. Two kinds of overheads are required for BTC coding: bit plane and quantization values, respectively. A new technique is presented to reduce the bit plane overhead. Conventional bit plane overhead is 1.0 bits/pixel;we decrease it to 0.734 bits/pixel while maintaining the same decoded quality as absolute moment BTC (AMBTC) does for the "Lena" image. Compared to other published bit plane coding strategies, the proposed method outperforms all of the existing methods. (C) 2002 Society of Photo-Optical Instrumentation Engineers.
Multimedia applications, such as image processing including image and video transfer, heavily rely on reduction. The traditional device methods to picture reduction use more space, energy, and processing time. The maj...
详细信息
Multimedia applications, such as image processing including image and video transfer, heavily rely on reduction. The traditional device methods to picture reduction use more space, energy, and processing time. The majority of current efforts use the Golomb-Rice encoding, due to its larger memory requirement and higher computing difficulty. So, this research concentrated on hardware design-oriented probability run length (PRL) coding technique based on lossless colour image compression. The block truncation coding (BTC) features of the compression process are used by the suggested PRL method. The proposed image compression hardware consists of various modules such as a Parameter calculator, fuzzy table, bitmap generator, BTC parameters training, prediction, and error control, and PRL-based finite state machine (PRL-FSM). The proposed image compressor utilizes the parameter calculator block, which estimates the block type based on the image pixel intensities for each sub-block. Thus, each block of the image is compressed by using a new block type and generates a variable block size. The proposed method utilizes the PRL-BTC encoding method, which also calculates the probability of error between the compressed image to the test image. The process is iterated until the performance trade-off between hardware cost and compression ratio (CR) is achieved. Hence, both smooth regions and non-smooth regions of images are perfectly compressed by the probability-based block selection. The simulation results show that the proposed method resulted in a better area, power, delay metrics, peak signal-to-noise ratio (PSNR), and CR compared to the state of art approaches.
This paper presents a hierarchical scheme with block-based and pixel-based codebooks for foreground detection. The codebook is mainly used to compress information to achieve a high efficient processing speed. In the b...
详细信息
This paper presents a hierarchical scheme with block-based and pixel-based codebooks for foreground detection. The codebook is mainly used to compress information to achieve a high efficient processing speed. In the block-based stage, 12 intensity values are employed to represent a block. The algorithm extends the concept of the block truncation coding, and thus it can further improve the processing efficiency by enjoying its low complexity advantage. In detail, the block-based stage can remove most of the backgrounds without reducing the true positive rate, yet it has low precision. To overcome this problem, the pixel-based stage is adopted to enhance the precision, which also can reduce the false positive rate. Moreover, the short-term information is employed to improve background updating for adaptive environments. As documented in the experimental results, the proposed algorithm can provide superior performance to that of the former related approaches.
A simple and easy to implement technique for improving block truncation coding (BTC) is proposed. The method is based on replacement of bit block obtained using the conventional BTC method with the fuzzy logical bit b...
详细信息
A simple and easy to implement technique for improving block truncation coding (BTC) is proposed. The method is based on replacement of bit block obtained using the conventional BTC method with the fuzzy logical bit block (LBB) such that the sample mean and standard deviation in each image block are preserved. This fuzzy LBB is obtained from the fuzzy edge image by using the Yager involutive fuzzy complement edge operator (YIFCEO). The input image is encoded with the block mean and standard deviation and the fuzzy LBB. Experimental results show an improvement of visual quality of reconstructed images and peak signal-to-noise ratio (PSNR) when compared to the conventional BTC. The raggedness and jagged appearance and the ringing artifacts at sharp edges are greatly reduced in the reconstructed images. With the use of YIFCEO, the proposed method is shown to be more flexible to determine the visual quality of the reconstructed images. (C) 2008 Elsevier B.V. All rights reserved.
It is a hot topic in the design of information hiding algorithm by a combination of compressed technique and interpolation technique in the future. Higher capacity and better image quality are one of the foremost rese...
详细信息
It is a hot topic in the design of information hiding algorithm by a combination of compressed technique and interpolation technique in the future. Higher capacity and better image quality are one of the foremost research contents of information hiding. In recent years, an adaptive information hiding has been a hot content of research in the field of information hiding and network security. This paper proposed an adaptive image steganography using absolute moment block truncation coding compression (AMBTC compression) and interpolation technique (ASAI), which can improve the performance of information hiding scheme. The ASAI scheme proposed can offer the benefits of high embedding capacity with low computational complexity and good image quality. The experimental results demonstrate that the proposed ASAI scheme has superior performance than others. (C) 2015 Elsevier GmbH. All rights reserved.
In this paper, a general method of (k, n) threshold Reversible Absolute moment block truncation coding Visual Cryptography Scheme (RAVCS) is introduced for sharing a binary secret image into multiple absolute moment b...
详细信息
In this paper, a general method of (k, n) threshold Reversible Absolute moment block truncation coding Visual Cryptography Scheme (RAVCS) is introduced for sharing a binary secret image into multiple absolute moment block truncation coding (AMBTC) shadows. A (k, k) RAVCS is firstly proposed to encode a secret by referencing one ABMTC image. Then, the proposed (k, k) RAVCS is adopted to share the same secret into multiple groups of shadows by referencing multiple images. Those multiple groups of shadows are distributed to participants according to a matrix generated by the proposed shadow distribution algorithms. When any k or more participants share their shadows, the secret image is revealed by OR or XOR decryption. Further, those AMBTC shadows can be losslessly reverted to their original forms. Sufficient theoretical analysis and extensive experimental results are provided in this paper, showing the effectiveness and advantages of the proposed method. (C) 2017 Elsevier Inc. All rights reserved.
In order to utilize the liquid crystal display (LCD) overdrive technique, it is necessary to store the previous frame in frame memory and compress the frame to reduce the memory burden, in particular, when the frame s...
详细信息
In order to utilize the liquid crystal display (LCD) overdrive technique, it is necessary to store the previous frame in frame memory and compress the frame to reduce the memory burden, in particular, when the frame size is large. When an image is displayed in the LCD, the motion blur mainly occurs near the edge, so that structural information is very important when compressing the image. Recently, a structural similarity (SSIM) index has been proposed to measure the quality based on the image structure. In this paper, we propose an image compression and adaptive mode selection algorithm for maximizing the SSIM performance. In the simulation results, we compare our results with conventional schemes and demonstrate that the SSIM based scheme provides a significant performance improvement.(1)
This paper develops an integrity protection technique based on image demosaicking. To provide the reversible property, the rebuilt components in color pixels are used for secret data embedding. The random value and th...
详细信息
This paper develops an integrity protection technique based on image demosaicking. To provide the reversible property, the rebuilt components in color pixels are used for secret data embedding. The random value and the hashed result of the most significant high-order bits of the color components are employed to generate the authentication code for each rebuilt component. In addition, the optimal single bit map block truncation coding (OSBMBTC) technique is adopted for generating recovery codes. A block-based image recovery procedure is designed to reconstruct the modified areas. Experimental results reveal that the illegally tampered objects in the test images can be found in these tests even when 87.5% pixels are modified. From the results, the image quality of the recovery image is acceptable when 50% of pixels are modified. Moreover, the demosaicked image can be reversibly constructed when the embedded image is not tampered.
A novel removable visible watermarking (RVW) algorithm by combining block truncation coding (BTC) and chaotic map (RVWBCM) is presented in this paper. It embeds a visible watermark in the BTC codes of images, namely b...
详细信息
A novel removable visible watermarking (RVW) algorithm by combining block truncation coding (BTC) and chaotic map (RVWBCM) is presented in this paper. It embeds a visible watermark in the BTC codes of images, namely both the host image and the watermarked image are BTC compressed images. First, the original image is divided into watermarked region and non-watermarked region, and a predicted version of original image can be obtained by predicting pixel values in watermarked region. Second, adaptive embedding factors are computed according to the image features. Third, the watermark is adaptively embedded into two quantization levels of the BTC compressed image in visible manner. Meanwhile, to further prevent illegal watermark removal, original bi-level watermark is encrypted and then losslessly embedded in invisible manner by adjusting the relationship of two quantization levels. At the receiver's end, only authorized users can exactly extract original bi-level watermark according the relationship of two quantization levels of BTC codes and succeed in remove the embedded visible watermark to reconstruct the original image. The experimental results show that this scheme can achieve a good balance between perceptual transparence and the watermark strength (watermark visibility) and can resist common image processing attacks. The proposed algorithm has low complexity and simplicity of implementation due to the use of BTC. It can be applicable to copyright notification and secure access control in mobile communication.
A novel hybrid image compression method based on quadtree is proposed, involving two techniques: vector quantization (VQ) and cubic B-spline interpolation. Traditional block-based image compression methods, such as VQ...
详细信息
A novel hybrid image compression method based on quadtree is proposed, involving two techniques: vector quantization (VQ) and cubic B-spline interpolation. Traditional block-based image compression methods, such as VQ, block truncation coding and others, do not take the relationship of neighbouring blocks into consideration, which results in a limit to their compression rate. To put it another way, if the relationships between neighbouring blocks can be included in the scheme by application of the quadtree technique and the VQ method, as well as cubic B-spline interpolation, which is exactly what is attempted in this paper, the performance of image compression can be improved significantly. According to the experimental results, this method can achieve satisfactory results in terms of the compression rate, while maintaining an acceptable image quality compared with block-based image compression methods.
暂无评论