II Theories and Techniques for Image Compression
|
|
- Scott Short
- 7 years ago
- Views:
Transcription
1 Experiment 7 IMAGE COMPRESSION I Introduction A digital image obtained by sampling and quantizing a continuous tone picture requires an enormous storage. For instance, a 24 bit color image with 512x512 pixels will occupy 768 Kbyte storage on a disk, and a picture twice of this size will not fit in a single floppy disk. To transmit such an image over a 28.8 Kbps modem would take almost 4 minutes. The purpose for image compression is to reduce the amount of data required for representing sampled digital images and therefore reduce the cost for storage and transmission. Image compression plays a key role in many important applications, including image database, image communications, remote sensing (the use of satellite imagery for weather and other earth-resource applications), document and medical imaging, facsimile transmission (FAX), and the control of remotely piloted vehicles in military, space, and hazardous waste control applications. In short, an ever-expanding number of applications depend on the efficient manipulation, storage, and transmission of binary, gray-scale, or color images. An important development in image compression is the establishment of the JPEG standard for compression of color pictures. Using the JPEG method, a 24 bit/pixel color images can be reduced to between 1 to 2 bits/pixel, without obvious visual artifacts. Such reduction makes it possible to store and transmit digital imagery with reasonable cost. It also makes it possible to download a color photograph almost in an instant, making electronic publishing/advertising on the Web a reality. Prior to this event, G3 and G4 standards have been developed for compression of facsimile documents, reducing the time for transmitting one page of text from about 6 minutes to 1 minute. In this experiment, we will introduce the basics of image compression, including both binary images and continuous tone images (gray-scale and color). Video compression will be covered in the next experiment. II Theories and Techniques for Image Compression In general, coding method can be classified into Lossless and Lossy. With lossless coding, the original sample values are retained exactly and compression is achieved by exploring the statistical redundancies in the signal. With lossy coding, the original signal is altered to some extent to achieve a higher compression radio. 1
2 II.1 II.1.1 Lossless Coding Variable Length Coding [1, Chapter6.4] In variable length coding (VLC), the more probable symbol is represented with fewer bits (using a shorter codeword). The Shannon s first theorem [3] states that the average length per symbol, l, is bounded by the entropy of source, H, i.e., H= pn log 2 pn l= pn ln pn (log 2 pn + 1) = H+ 1 (10.1) where p n is the probability of the n-th symbol, H is the entropy of the source, which represents the average information, l n is the length of the codeword for symbol n, and l is the average codeword length. II.1.2 Huffman Coding The Shannon theorem only gives the bound but not the actual way of constructing the code to achieve the bound. On way to accomplish the later task is by a method known as Huffman Coding. Example: Consider an image that is quantized to 4 levels: 0, 1, 2, and 3. Suppose the probability of these levels are respectively 1/49, 4/49, 36/49 and 8/49. The design of a Huffman code is illustrated in the Figure 1. Symbol Prob Codeword Length / / /49 13/ /49 0 1/ Figure 1 An Example of Huffman Coding In this example, we have 2
3 36 Average length l = = = ( ) Entropy of the source H= pk log pk = H < l < H + 1 II.1.3 Other Variable Length Coding Methods LZW Coding (Lempel, Ziv, And Welsh)[2] is the algorithm used in several public domain software for lossless data compression, such as gzip (UNIX) and pkzip (DOS). One of the most famous graphic file formats GIF also incorporates the LZW coding scheme. Another method known as Arithmetic Coding [2] is more powerful than both Huffman coding and LZW Coding. But it also requires more computation. II.1.4 Runlength Coding (RLC) of Bilevel Images [1, Chapter 6.6] In one dimensional runlength coding of bilevel images, one scans the pixels from left to right along each scan line. Assume that a line always starts and ends with white pixels, one counts the number (referred to as runlength) of white pixels and that of the black pixels alternatively. The last run of white pixels are replaced with a special symbol EOL (end of line). The runlengths of white and black are coded using separate codebooks. The codebook, say, for the white runlengths is designed using Huffman Coding method by treating each possible runlength (including EOL) as a symbol. An example of runlengths Coding is illustrated in the Fig. 2. 3
4 EOL (End of line) RUN-LENGTH CODING White Runlength Black Runlength x x x x - - x x x x x - - x x x x - - x x x x x x x x - - x x x x x x - - x x x x x x - - x x x x x - - x x x x - - x x x x x x x x x x x x x x x x x x - - x x x x - x x x x - - x x x x - - x x x x Fig. 2 An example of runlength coding II.1.5 Two Dimensional Runlength Coding [1, Chapter 6.6] One dimensional runlength coding method only explores the correlation among pixels in the same line. In two dimensional runlength coding or relative address coding, the correlation among pixels in the current line as well as the previous line is explored. With this method, when a transition in color occurs, the distance of this pixel to the most closest transition pixel (both before and after this pixel) in the previous line as well as to the last transition pixel in the same line are calculated, and the one with the shortest distance is coded, along with an index indicating which type of distance is coded. See Fig in [1]. 4
5 II.1.6 CCITT Group 3 and Group 4 Facsimile Coding Standard - The READ Code [1,Chapter 6.6] In the Group 3 method, the first line in every K lines is coded using 1-D runlength coding, and the following (K-1) lines are coded using a 2-D runlength coding method known as Relative Element Address Designate (READ). For details of this method and the actual code tables, see [1], Sec The reason that the 1-D RLC is used for every K line is to suppress propagation of transmission errors. Otherwise, if the READ method is used continuously, when one bit error occurs somewhere during transmission, it will affect the entire page. The Group 4 method is designed for more secure transmission media, such as leased data lines where the bit error rate is very low. The algorithm is basically a streamline of the Group 3 method, with 1-D RLC eliminated. II.1.7 Lossless Predictive Coding Motivation: The value of a current pixel usually does not change rapidly from those of adjacent pixels. Thus it can be predicted quite accurately from the previous samples. The prediction error will have a non-uniform distribution, centered mainly near zero, which has a lower entropy than the original samples, which usually have a uniform distribution. For detail see [2] Sec With entropy coding (e.g. Huffman coding), the error values can be specified with fewer bits than that required for specifying the original sample values. II.2 Transform Coding (Lossy Coding) [1,Chapter 6.5] Lossless coding can achieve a compression ratio of for most images. To further reduce the data amount, lossy coding methods apply quantization to the original samples or parameters of some transformation of the original signal ( e.g. prediction or transformation). The transformation is to exploit the statistical correlation among original samples. Popular methods include linear prediction and unitary transforms. We have discussed linear prediction coding and its application in speech and audio coding in the previous experiment. You have learnt and experimented with uniform and non-uniform quantization in the previous experiment as well. In this section, we focus on transform coding, which is more effective for images. One of the most popular lossy coding schemes for images is transform coding. In block-based transform coding, one divides an image into non-overlapping blocks. For each block, one first transforms the original pixel values into a set of transform coefficients using a unitary transform. The transformed coefficients are then quantized and coded. In the decoder, one reconstructs the original block from the quantized coefficients through an inverse transform. The transform is designed to compact the energy of the original signal into only a few coefficients, and to reduce the correlation among the variables to be coded. Both will contribute to the reduction of the bit rate. 5
6 II.2.1 The Discrete Cosine Transformation (DCT) The DCT is popular with image signals because it matches well with the statistics of common image signals. The basis vectors of the one dimensional N-point DCT are defined by: n k hk ( n) ( k)cos( ( ) π = α ), with α ( k) = 2N 1 N k = 0 2 N k = 12,,..., N 1. The forward and inverse transforms are described by: N 1 N 1 n k tk ( ) hk ( n) f( n) ( k) f( n)cos( ( ) * π = = α ) 2N n= 0 n= 0 N 1 N 1 n k f ( n) = hk ( n) t( k) = ( k) t( k)cos( ( ) π α ) 2N n= 0 n= 0. Note that the basis vectors vary in a sinusoidal pattern with increasing frequency. Note that the N-point DCT is related to the 2N-point DFT, but is not the real part of it. Each DCT coefficient specifies the contribution of a sinusoidal pattern at a particular frequency to the actual signal. The lowest coefficient, known as the DC coefficient, represents the average value of the signal. The other coefficients, known as AC coefficients, are associated with increasingly higher frequencies. To obtain 2-D DCT of an image block, one can first apply the above 1-D DCT to each row of the image block, and then apply the 1-D DCT to each column of the row transformed block. A 2D transform is equivalent to represent an image block as a supposition of many basic block patterns. The basic block patterns corresponding to 8x8 DCT are shown in Fig. 3. This figure is generated using Matlab script: T=dctmtx2(8); figure; colormap(gray(256));n=1; for (i=1:8) for (j=1:8) subplot(8,8,n), imagesc(t(i,:)'*t(j,:)); axis off; axis image; n=n+1; end; end; 6
7 Low-Low High-Low Low-High High-High Figure 3 Two-dimensional DCT Basis Images II.2.2 Representation of Image Blocks Using DCT The reason that DCT is well suited for image compression is that an image block can often be represented with a few low frequency DCT coefficients. This is because the intensity values in an image is usually varying smoothly and very high frequency components only exist near edges. Fig. 4 shows the distribution of the DCT coefficient variances (i.e the energy) as the frequency index increases. Fig. 5 shows the approximation of an image using different number of DCT coefficients. We can see that with only 16 out of 64 coefficients, we can already represent the original block quite well. You can experiment with the approximation accuracy by different number of DCT coefficients using the Matlab demo program dctdemo. 7
8 Variance Coefficient Index (Zig-Zag Order) Figure 4 DCT Coefficient Variance decreases as the frequency index increases Original With 16/64 Coefficients With 8/64 Coefficients With 4/64 Coefficients Figure 5 Images reconstructed with different number of DCT coefficients 8
9 II.2.3 JPEG Standard for Still Image Compression The JPEG standard refers to the international standard for still image compression recommended by the Joint Photographic Expert Group (JPEG) of the ISO (International Standards Organization) [1, Chap. 6]. It consists of three parts: i) a baseline DCT based lossy compression method for standard resolution and precision ( 8 bits/color /pixel) images; ii) an extended coding method for higher resolution/precision images, which use the baseline algorithm in a progressive manner; and iii) a lossless predictive coding method. Given an image, it is first divided into 8x8 non-overlapping blocks. An 8x8 DCT is then applied to each block. For the DC coefficient of each block, a predictive coding method is used. That is, the current DC value is predicted by the DC value of the previous block, and the prediction error is quantized using a uniform quantizer. The other AC coefficients are quantized directly using different quantizers (i.e. with different step-sizes). The step-sizes for the DC prediction error and other AC coefficients are specified in a normalization matrix. The particular matrix used can be specified in the beginning of the compressed bit stream as side information. Alternatively, one can use the matrix recommended by the JPEG as default, which is shown in Fig 5. Usually one can trade-off the quality with the compression ratio by scaling the normalization matrix using a scale factor. For example, a scale factor of two means the step-size for every coefficient is doubled. On the other hand, a scale factor of 0.5 cuts all the step-sizes by half. A smaller scale factor will lead to a more accurate representation of the original image, but also a lower compression gain (i.e. higher bit rate). Fig. 5 A typical normalization matrix 9
10 Fig. 6 A typical zig-zag mask. For the binary encoding of the quantized DC prediction error and DC coefficients, a combination of fixed and variable length coding is used. All possible DC prediction error values and all AC coefficient values (after quantization) are divided into separate categories according to their magnitude. See Table 6.14 in [1] for the categorization rule. The DC prediction error is encoded by a two-part code. The first part specifies which category it is in, and the second part specifies the actual relative magnitude in that category. The first part is Huffman coded based on the frequencies of different categories, while the second part is coded using a fixed length codeword. For the AC coefficients, a runlength coding method is used. It arranges the DCT coefficients into a 1D array following a zig-zag order, as illustrated in Fig. 5. The AC coefficients are converted into symbols, each symbol is a pair consisting of the runlength of zeros from the last non-zero value and the following non-zero value. The non-zero value is further specified in two parts, similar to the approach for the DC prediction error. The first part specifies which category it belongs to, and the second part specifies the relative magnitude. The symbol consisting of the zero runlength and the category of the non-zero value is Huffman coded, while the relative magnitude of the non-zero value is coded using a fixed length code. The standard recommends some default Huffman tables for the DC prediction error and the AC symbols. But the user can also specify different tables that are optimized for the statistics of the images in a particular application. For a color image, each color component is compressed separately using the same method. II.3 Vector Quantization Vector quantization (VQ) is another approach for image compression. The idea behind VQ is to determine the best set of basic block patterns (each called a codeword) that can best represent all images blocks present in an image. The set of all basic patterns is called the codebook. Usually, the best codebook for a class of images is pre-designed. In the encoding process, for each given image block, the best matching codeword in the codebook is found. Although this searching process is more CPU-intensive than JPEG, it is much simpler and faster on the decoding (decompression side). Decoding vector quantization coded information involves looking up the appropriate codeword in the code book based on the index created during the encoding process. The complexity of VQ growth exponentially with the size of the block (i.e. number of pixels in a block). In practice, block size equal or less than 4x4 is often used. Figure 7 describes the vector quantization architecture. The simplest approach to processing an image partitions the input image at the encoder into small, contiguous, nonoverlapping rectangular blocks or vectors of pixels, each of which is individually quantized. The vector dimension is given by the number of pixels in the block. The 10
11 vector of samples is a pattern that must be approximated by a finite set test patterns. The patterns are stored in a dictionary, the codebook. The patterns in the code book are called codewords. During compression, the encoder assigns to each input vector an address or index identifying the codeword in the codebook that best approximates the input vector. In the decoder, each index is mapped into an output vector taken from codebook. The decoder reconstructs the image as a patchwork quilt by reconstructing the vectors in the same sequence as the input vectors. The Intel Indeo technology is based on a proprietary vector quantization methodology. Input Image (Input Vectors) Encoder nearest neighbour search Decoder table lookup Output Vector Code Vectors Code Book Fig. 7. Vector Quantization 11
12 III Experiment 1) For bi-level runlength coding, if you have an Image x=[ ; ; ], the output should yield code=[ ]. Use h:\el593\exp10\e.gif as your input image and perform bi-level-runlength coding manually and count the probability of different runlengths. Then use Huffman Coding to decide the codeword for each symbol and calculate the average code length. You can use dispgif to read the input file and display the data of the image. 2) Demo10.m is a program that performs DCT over each 8x8 image block, then quantizes the DCT coefficients. Finally it performs inverse DCT to obtain a reconstructed image. Play with the program to see the effect of quantization using different quantization scale factors. 3) Modify the demo10.m program so that instead of quantizing the DCT coefficients using a supplied normalization matrix, you will retain only the first L coefficients in a zig-zag order. Try out different values of L (e.g. 1 L 16). Hint you should modify the mask in the program based on which coefficients to be reserved and which to be zeroed out. 4) Modify the demo10.m program so that instead of quantizing the DCT coefficients using a supplied normalization matrix, you will retain only those coefficients that have a magnitude greater than a threshold T. Try out different values of T (e.g. 1 T 256). NOTE: You must show your work to the instructor and get a signature. IV Report 1) Submit the programs you wrote. Include the source code and your output results. 2) For experiment #2,3, 4, comment on the effect of different quantization parameters, the number of retained coefficients, and the threshold. What are the maximum scale factor, the minimum number of coefficients, and the maximum threshold, respectively, that can be while still maintaining an acceptable visual quality of the image? 3) For a video sequence, the image size for each frame is 360x240 and the frame rate is 30 frames/second with full color (3 bytes/pixel). What would be the compression ratio for this sequence to be 1.5 Mbits/second? 12
13 V References 1) R. C. Gonzalez & R. E. Woods, Digital Image Processing, Addison Wesley ) A. N. Netravali and B. G. Haskell, " Digital Pictures -- Representation, Compression, and Standards ", 2nd ed., Plenum Press, ) A. V. Oppenheim, R. W. Schafer, " Discrete-Time Signal Processing ", Prentice Hall, ) Matlab User's Guide, The Math Works Inc., ) Matlab Reference Guide, The Math Works Inc.,
14 6) APPENDIX A. ****************************************************************** * MATLAB Script file for demonstration of DCT * ****************************************************************** function demo10(filename,dx,dy); % Demo program for EL593 Exp.10 % usage : demo8('h:\el593\exp10\lena.img',256,256); Img=fread(fopen(FileName),[dx,dy]); colormap(gray(256)); image(img'); set(gca,'xtick',[],'ytick',[]); title('original Image'); truesize; drawnow y=blkproc(img,[8 8],'dct2'); yy=blkproc(y,[8 8],'mask2'); yq=blkproc(yy,[8,8],'idct2'); figure; colormap(gray(256)); image(yq'); set(gca,'xtick',[],'ytick',[]); title('quantized Image'); truesize; drawnow 14
15 ****************************************************************** * MATLAB Script file for demonstration of DCT (subroutine 1) * ****************************************************************** function [y]=mask2(x); mask=[ ; ; ; ; ; ; ; ]; x=x/8; % Normally c=1 c=16; mask=c*mask; z=round(x./mask); y=mask.*z; y=8*y; 15
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
More informationJPEG Image Compression by Using DCT
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*
More informationComparison of different image compression formats. ECE 533 Project Report Paula Aguilera
Comparison of different image compression formats ECE 533 Project Report Paula Aguilera Introduction: Images are very important documents nowadays; to work with them in some applications they need to be
More informationVideo Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu
Video Coding Basics Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Outline Motivation for video coding Basic ideas in video coding Block diagram of a typical video codec Different
More informationReading.. IMAGE COMPRESSION- I IMAGE COMPRESSION. Image compression. Data Redundancy. Lossy vs Lossless Compression. Chapter 8.
Reading.. IMAGE COMPRESSION- I Week VIII Feb 25 Chapter 8 Sections 8.1, 8.2 8.3 (selected topics) 8.4 (Huffman, run-length, loss-less predictive) 8.5 (lossy predictive, transform coding basics) 8.6 Image
More informationCHAPTER 2 LITERATURE REVIEW
11 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION Image compression is mainly used to reduce storage space, transmission time and bandwidth requirements. In the subsequent sections of this chapter, general
More informationIntroduction to image coding
Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by
More informationInformation, Entropy, and Coding
Chapter 8 Information, Entropy, and Coding 8. The Need for Data Compression To motivate the material in this chapter, we first consider various data sources and some estimates for the amount of data associated
More informationIntroduction to Medical Image Compression Using Wavelet Transform
National Taiwan University Graduate Institute of Communication Engineering Time Frequency Analysis and Wavelet Transform Term Paper Introduction to Medical Image Compression Using Wavelet Transform 李 自
More informationencoding compression encryption
encoding compression encryption ASCII utf-8 utf-16 zip mpeg jpeg AES RSA diffie-hellman Expressing characters... ASCII and Unicode, conventions of how characters are expressed in bits. ASCII (7 bits) -
More informationCompression techniques
Compression techniques David Bařina February 22, 2013 David Bařina Compression techniques February 22, 2013 1 / 37 Contents 1 Terminology 2 Simple techniques 3 Entropy coding 4 Dictionary methods 5 Conclusion
More informationVideo-Conferencing System
Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video
More informationFigure 1: Relation between codec, data containers and compression algorithms.
Video Compression Djordje Mitrovic University of Edinburgh This document deals with the issues of video compression. The algorithm, which is used by the MPEG standards, will be elucidated upon in order
More informationA NEW LOSSLESS METHOD OF IMAGE COMPRESSION AND DECOMPRESSION USING HUFFMAN CODING TECHNIQUES
A NEW LOSSLESS METHOD OF IMAGE COMPRESSION AND DECOMPRESSION USING HUFFMAN CODING TECHNIQUES 1 JAGADISH H. PUJAR, 2 LOHIT M. KADLASKAR 1 Faculty, Department of EEE, B V B College of Engg. & Tech., Hubli,
More informationSachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India
Abstract Image compression is now essential for applications such as transmission and storage in data bases. In this paper we review and discuss about the image compression, need of compression, its principles,
More informationConceptual Framework Strategies for Image Compression: A Review
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Conceptual Framework Strategies for Image Compression: A Review Sumanta Lal
More informationData Storage 3.1. Foundations of Computer Science Cengage Learning
3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how
More informationhttp://www.springer.com/0-387-23402-0
http://www.springer.com/0-387-23402-0 Chapter 2 VISUAL DATA FORMATS 1. Image and Video Data Digital visual data is usually organised in rectangular arrays denoted as frames, the elements of these arrays
More informationData Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:
Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how
More informationJPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
More informationDiffusion and Data compression for data security. A.J. Han Vinck University of Duisburg/Essen April 2013 Vinck@iem.uni-due.de
Diffusion and Data compression for data security A.J. Han Vinck University of Duisburg/Essen April 203 Vinck@iem.uni-due.de content Why diffusion is important? Why data compression is important? Unicity
More informationFFT Algorithms. Chapter 6. Contents 6.1
Chapter 6 FFT Algorithms Contents Efficient computation of the DFT............................................ 6.2 Applications of FFT................................................... 6.6 Computing DFT
More informationANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS
ANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS Dasaradha Ramaiah K. 1 and T. Venugopal 2 1 IT Department, BVRIT, Hyderabad, India 2 CSE Department, JNTUH,
More informationA deterministic fractal is an image which has low information content and no inherent scale.
FRACTAL IMAGE COMPRESSION: A RESOLUTION INDEPENDENT REPRESENTATION FOR IMAGER?? Alan D. Sloan 5550 Peachtree Parkway Iterated Systems, Inc. Norcross, Georgia 30092 1. Background A deterministic fractal
More informationImplementation of ASIC For High Resolution Image Compression In Jpeg Format
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue 4, Ver. I (Jul - Aug. 2015), PP 01-10 e-issn: 2319 4200, p-issn No. : 2319 4197 www.iosrjournals.org Implementation of ASIC For High
More informationFCE: A Fast Content Expression for Server-based Computing
FCE: A Fast Content Expression for Server-based Computing Qiao Li Mentor Graphics Corporation 11 Ridder Park Drive San Jose, CA 95131, U.S.A. Email: qiao li@mentor.com Fei Li Department of Computer Science
More informationStudy and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of
More informationTo determine vertical angular frequency, we need to express vertical viewing angle in terms of and. 2tan. (degree). (1 pt)
Polytechnic University, Dept. Electrical and Computer Engineering EL6123 --- Video Processing, S12 (Prof. Yao Wang) Solution to Midterm Exam Closed Book, 1 sheet of notes (double sided) allowed 1. (5 pt)
More informationDigital Video Coding Standards and Their Role in Video Communications
Digital Video Coding Standards and Their Role in Video Communications RALF SCHAFER AND THOMAS SIKORA, MEMBER, IEEE Invited Paper The eficient digital representation of image and video signals has been
More informationFor Articulation Purpose Only
E305 Digital Audio and Video (4 Modular Credits) This document addresses the content related abilities, with reference to the module. Abilities of thinking, learning, problem solving, team work, communication,
More informationA comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
More informationELECTRONIC DOCUMENT IMAGING
AIIM: Association for Information and Image Management. Trade association and professional society for the micrographics, optical disk and electronic image management markets. Algorithm: Prescribed set
More informationStructures for Data Compression Responsible persons: Claudia Dolci, Dante Salvini, Michael Schrattner, Robert Weibel
Geographic Information Technology Training Alliance (GITTA) presents: Responsible persons: Claudia Dolci, Dante Salvini, Michael Schrattner, Robert Weibel Content 1.... 2 1.1. General Compression Concepts...3
More informationComputer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction
Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals Modified from the lecture slides of Lami Kaya (LKaya@ieee.org) for use CECS 474, Fall 2008. 2009 Pearson Education Inc., Upper
More informationAuto-Tuning Using Fourier Coefficients
Auto-Tuning Using Fourier Coefficients Math 56 Tom Whalen May 20, 2013 The Fourier transform is an integral part of signal processing of any kind. To be able to analyze an input signal as a superposition
More informationDigital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
More informationHybrid Lossless Compression Method For Binary Images
M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering
More informationENG4BF3 Medical Image Processing. Image Visualization
ENG4BF3 Medical Image Processing Image Visualization Visualization Methods Visualization of medical images is for the determination of the quantitative information about the properties of anatomic tissues
More informationDCT-JPEG Image Coding Based on GPU
, pp. 293-302 http://dx.doi.org/10.14257/ijhit.2015.8.5.32 DCT-JPEG Image Coding Based on GPU Rongyang Shan 1, Chengyou Wang 1*, Wei Huang 2 and Xiao Zhou 1 1 School of Mechanical, Electrical and Information
More informationIn the two following sections we separately consider hardware and software requirements. Sometimes, they will be offered for sale as a package.
Appendix A COMPUTER HARDWARE AND SOFTWARE In this appendix we discuss some of the issues in choosing hardware and software for image analysis. The purpose is to draw attention to the issues involved rather
More informationH.264/MPEG-4 AVC Video Compression Tutorial
Introduction The upcoming H.264/MPEG-4 AVC video compression standard promises a significant improvement over all previous video compression standards. In terms of coding efficiency, the new standard is
More informationSolutions to Exam in Speech Signal Processing EN2300
Solutions to Exam in Speech Signal Processing EN23 Date: Thursday, Dec 2, 8: 3: Place: Allowed: Grades: Language: Solutions: Q34, Q36 Beta Math Handbook (or corresponding), calculator with empty memory.
More informationLossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding C. SARAVANAN cs@cc.nitdgp.ac.in Assistant Professor, Computer Centre, National Institute of Technology, Durgapur,WestBengal,
More informationMichael W. Marcellin and Ala Bilgin
JPEG2000: HIGHLY SCALABLE IMAGE COMPRESSION Michael W. Marcellin and Ala Bilgin Department of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ 85721. {mwm,bilgin}@ece.arizona.edu
More informationbalesio Native Format Optimization Technology (NFO)
balesio AG balesio Native Format Optimization Technology (NFO) White Paper Abstract balesio provides the industry s most advanced technology for unstructured data optimization, providing a fully system-independent
More informationClass Notes CS 3137. 1 Creating and Using a Huffman Code. Ref: Weiss, page 433
Class Notes CS 3137 1 Creating and Using a Huffman Code. Ref: Weiss, page 433 1. FIXED LENGTH CODES: Codes are used to transmit characters over data links. You are probably aware of the ASCII code, a fixed-length
More informationVideo compression: Performance of available codec software
Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes
More informationStatistical Modeling of Huffman Tables Coding
Statistical Modeling of Huffman Tables Coding S. Battiato 1, C. Bosco 1, A. Bruna 2, G. Di Blasi 1, G.Gallo 1 1 D.M.I. University of Catania - Viale A. Doria 6, 95125, Catania, Italy {battiato, bosco,
More informationINTERNATIONAL TELECOMMUNICATION UNION TERMINAL EQUIPMENT AND PROTOCOLS FOR TELEMATIC SERVICES
INTERNATIONAL TELECOMMUNICATION UNION CCITT T.81 THE INTERNATIONAL (09/92) TELEGRAPH AND TELEPHONE CONSULTATIVE COMMITTEE TERMINAL EQUIPMENT AND PROTOCOLS FOR TELEMATIC SERVICES INFORMATION TECHNOLOGY
More informationSecured Lossless Medical Image Compression Based On Adaptive Binary Optimization
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IV (Mar-Apr. 2014), PP 43-47 Secured Lossless Medical Image Compression Based On Adaptive Binary
More informationLZ77. Example 2.10: Let T = badadadabaab and assume d max and l max are large. phrase b a d adadab aa b
LZ77 The original LZ77 algorithm works as follows: A phrase T j starting at a position i is encoded as a triple of the form distance, length, symbol. A triple d, l, s means that: T j = T [i...i + l] =
More informationRaster Data Structures
Raster Data Structures Tessellation of Geographical Space Geographical space can be tessellated into sets of connected discrete units, which completely cover a flat surface. The units can be in any reasonable
More informationKhalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska
PROBLEM STATEMENT A ROBUST COMPRESSION SYSTEM FOR LOW BIT RATE TELEMETRY - TEST RESULTS WITH LUNAR DATA Khalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska The
More informationA Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
More informationCoding and Patterns of Data Streams
Characterizing Video Coding Computing in Conference Systems By G. Tuquerres (tuquerre@cs.utwente.nl) Telematics Systems and Services Twente University Abstract In this paper, a number of coding operations
More information2+2 Just type and press enter and the answer comes up ans = 4
Demonstration Red text = commands entered in the command window Black text = Matlab responses Blue text = comments 2+2 Just type and press enter and the answer comes up 4 sin(4)^2.5728 The elementary functions
More informationArtificial Neural Network for Speech Recognition
Artificial Neural Network for Speech Recognition Austin Marshall March 3, 2005 2nd Annual Student Research Showcase Overview Presenting an Artificial Neural Network to recognize and classify speech Spoken
More informationDynamic Adaptation in an Image Transcoding Proxy For Mobile Web Browsing
Dynamic Adaptation in an Image Transcoding Proxy For Mobile Web Browsing Pravin Bhagwat, Richard Han, Richard LaMaire, Todd Mummert, Veronique Perret, Jim Rubas Mobile Networking Group Chung-Sheng Li,
More informationIndexing and Compression of Text
Compressing the Digital Library Timothy C. Bell 1, Alistair Moffat 2, and Ian H. Witten 3 1 Department of Computer Science, University of Canterbury, New Zealand, tim@cosc.canterbury.ac.nz 2 Department
More informationInternational Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. XXXIV-5/W10
Accurate 3D information extraction from large-scale data compressed image and the study of the optimum stereo imaging method Riichi NAGURA *, * Kanagawa Institute of Technology nagura@ele.kanagawa-it.ac.jp
More informationECE 468 / CS 519 Digital Image Processing. Introduction
ECE 468 / CS 519 Digital Image Processing Introduction Prof. Sinisa Todorovic sinisa@eecs.oregonstate.edu ECE 468: Digital Image Processing Instructor: Sinisa Todorovic sinisa@eecs.oregonstate.edu Office:
More informationMPEG-1 and MPEG-2 Digital Video Coding Standards
Please note that the page has been produced based on text and image material from a book in [sik] and may be subject to copyright restrictions from McGraw Hill Publishing Company. MPEG-1 and MPEG-2 Digital
More informationModule 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur
Module 8 VIDEO CODING STANDARDS Version ECE IIT, Kharagpur Lesson H. andh.3 Standards Version ECE IIT, Kharagpur Lesson Objectives At the end of this lesson the students should be able to :. State the
More informationToday s topics. Digital Computers. More on binary. Binary Digits (Bits)
Today s topics! Binary Numbers! Brookshear.-.! Slides from Prof. Marti Hearst of UC Berkeley SIMS! Upcoming! Networks Interactive Introduction to Graph Theory http://www.utm.edu/cgi-bin/caldwell/tutor/departments/math/graph/intro
More informationVideo Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.
Video Encryption Exploiting Non-Standard 3D Data Arrangements Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.at Andreas Uhl 1 Carinthia Tech Institute & Salzburg University Outline
More informationSolving Systems of Linear Equations Using Matrices
Solving Systems of Linear Equations Using Matrices What is a Matrix? A matrix is a compact grid or array of numbers. It can be created from a system of equations and used to solve the system of equations.
More informationData Mining Un-Compressed Images from cloud with Clustering Compression technique using Lempel-Ziv-Welch
Data Mining Un-Compressed Images from cloud with Clustering Compression technique using Lempel-Ziv-Welch 1 C. Parthasarathy 2 K.Srinivasan and 3 R.Saravanan Assistant Professor, 1,2,3 Dept. of I.T, SCSVMV
More informationLocating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith
More informationChapter 1 Introduction
Chapter 1 Introduction 1. Shannon s Information Theory 2. Source Coding theorem 3. Channel Coding Theory 4. Information Capacity Theorem 5. Introduction to Error Control Coding Appendix A : Historical
More informationTransform-domain Wyner-Ziv Codec for Video
Transform-domain Wyner-Ziv Codec for Video Anne Aaron, Shantanu Rane, Eric Setton, and Bernd Girod Information Systems Laboratory, Department of Electrical Engineering Stanford University 350 Serra Mall,
More informationBroadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
More informationMPEG Digital Video Coding Standards
MPEG Digital Video Coding Standards Thomas Sikora, HHI Berlin Preprint from Digital Consumer Electronics Handbook First Edition (Editor R.Jurgens) to be published by McGRAW-Hill Book Company Chapter 9
More informationDigital Transmission of Analog Data: PCM and Delta Modulation
Digital Transmission of Analog Data: PCM and Delta Modulation Required reading: Garcia 3.3.2 and 3.3.3 CSE 323, Fall 200 Instructor: N. Vlajic Digital Transmission of Analog Data 2 Digitization process
More informationLinear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
More informationCHAPTER 3: DIGITAL IMAGING IN DIAGNOSTIC RADIOLOGY. 3.1 Basic Concepts of Digital Imaging
Physics of Medical X-Ray Imaging (1) Chapter 3 CHAPTER 3: DIGITAL IMAGING IN DIAGNOSTIC RADIOLOGY 3.1 Basic Concepts of Digital Imaging Unlike conventional radiography that generates images on film through
More informationSteganography Based Seaport Security Communication System
, pp.302-306 http://dx.doi.org/10.14257/astl.2014.46.63 Steganography Based Seaport Security Communication System Yair Wiseman 1, 1 Computer Science Department Ramat-Gan 52900, Israel wiseman@cs.biu.ac.il
More informationMP3 Player CSEE 4840 SPRING 2010 PROJECT DESIGN. zl2211@columbia.edu. ml3088@columbia.edu
MP3 Player CSEE 4840 SPRING 2010 PROJECT DESIGN Zheng Lai Zhao Liu Meng Li Quan Yuan zl2215@columbia.edu zl2211@columbia.edu ml3088@columbia.edu qy2123@columbia.edu I. Overview Architecture The purpose
More informationFUNDAMENTALS of INFORMATION THEORY and CODING DESIGN
DISCRETE "ICS AND ITS APPLICATIONS Series Editor KENNETH H. ROSEN FUNDAMENTALS of INFORMATION THEORY and CODING DESIGN Roberto Togneri Christopher J.S. desilva CHAPMAN & HALL/CRC A CRC Press Company Boca
More informationDepartment of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
More informationECE 842 Report Implementation of Elliptic Curve Cryptography
ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic
More informationSTUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION
STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION Adiel Ben-Shalom, Michael Werman School of Computer Science Hebrew University Jerusalem, Israel. {chopin,werman}@cs.huji.ac.il
More informationUsing MATLAB to Measure the Diameter of an Object within an Image
Using MATLAB to Measure the Diameter of an Object within an Image Keywords: MATLAB, Diameter, Image, Measure, Image Processing Toolbox Author: Matthew Wesolowski Date: November 14 th 2014 Executive Summary
More informationThe Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
More informationWATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
More informationInformation Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
More informationSampling and Interpolation. Yao Wang Polytechnic University, Brooklyn, NY11201
Sampling and Interpolation Yao Wang Polytechnic University, Brooklyn, NY1121 http://eeweb.poly.edu/~yao Outline Basics of sampling and quantization A/D and D/A converters Sampling Nyquist sampling theorem
More informationBasics of Digital Recording
Basics of Digital Recording CONVERTING SOUND INTO NUMBERS In a digital recording system, sound is stored and manipulated as a stream of discrete numbers, each number representing the air pressure at a
More informationFast Arithmetic Coding (FastAC) Implementations
Fast Arithmetic Coding (FastAC) Implementations Amir Said 1 Introduction This document describes our fast implementations of arithmetic coding, which achieve optimal compression and higher throughput by
More informationDevelopment and Evaluation of Point Cloud Compression for the Point Cloud Library
Development and Evaluation of Point Cloud Compression for the Institute for Media Technology, TUM, Germany May 12, 2011 Motivation Point Cloud Stream Compression Network Point Cloud Stream Decompression
More informationVideo Coding Standards. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu
Video Coding Standards Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Yao Wang, 2003 EE4414: Video Coding Standards 2 Outline Overview of Standards and Their Applications ITU-T
More informationAnalysis of Compression Algorithms for Program Data
Analysis of Compression Algorithms for Program Data Matthew Simpson, Clemson University with Dr. Rajeev Barua and Surupa Biswas, University of Maryland 12 August 3 Abstract Insufficient available memory
More informationJPEG File Interchange Format
JPEG File Interchange Format Version 1.02 September 1, 1992 Eric Hamilton C-Cube Microsystems 1778 McCarthy Blvd. Milpitas, CA 95035 +1 408 944-6300 Fax: +1 408 944-6314 E-mail: eric@c3.pla.ca.us JPEG
More information1 Review of Least Squares Solutions to Overdetermined Systems
cs4: introduction to numerical analysis /9/0 Lecture 7: Rectangular Systems and Numerical Integration Instructor: Professor Amos Ron Scribes: Mark Cowlishaw, Nathanael Fillmore Review of Least Squares
More informationMPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music
ISO/IEC MPEG USAC Unified Speech and Audio Coding MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music The standardization of MPEG USAC in ISO/IEC is now in its final
More informationPCM Encoding and Decoding:
PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth
More informationSchool Class Monitoring System Based on Audio Signal Processing
C. R. Rashmi 1,,C.P.Shantala 2 andt.r.yashavanth 3 1 Department of CSE, PG Student, CIT, Gubbi, Tumkur, Karnataka, India. 2 Department of CSE, Vice Principal & HOD, CIT, Gubbi, Tumkur, Karnataka, India.
More information4 Digital Video Signal According to ITU-BT.R.601 (CCIR 601) 43
Table of Contents 1 Introduction 1 2 Analog Television 7 3 The MPEG Data Stream 11 3.1 The Packetized Elementary Stream (PES) 13 3.2 The MPEG-2 Transport Stream Packet.. 17 3.3 Information for the Receiver
More informationA WEB BASED TRAINING MODULE FOR TEACHING DIGITAL COMMUNICATIONS
A WEB BASED TRAINING MODULE FOR TEACHING DIGITAL COMMUNICATIONS Ali Kara 1, Cihangir Erdem 1, Mehmet Efe Ozbek 1, Nergiz Cagiltay 2, Elif Aydin 1 (1) Department of Electrical and Electronics Engineering,
More informationLab 1. The Fourier Transform
Lab 1. The Fourier Transform Introduction In the Communication Labs you will be given the opportunity to apply the theory learned in Communication Systems. Since this is your first time to work in the
More information