SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
G. Sreenivasulu et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1669-1672

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Effective Compression in Digital Images with SPIHT Algorithm
and Entropy
G. Sreenivasulu, B. Srinivasa Rao
Assistant Professor Sree Vidyanikethan Engg.College (Autonomous) Tirupati, Andhra Pradesh
Assistant Professor Sree Vidyanikethan Engg.College (Autonomous) Tirupati, Andhra Pradesh.

Abstract
Image compression is achieved by removing data redundancy while preserving information content. SPIHT is
computationally very fast and among the best image compression algorithms known today. According to
statistic analysis of the output binary stream of SPIHT encoding, propose a simple and effective method
combined with Entropy for further compression that saves a lot of bits in the image data transmission.
Keywords — Encoding; DWT; SPIHT; Huffman

I.

INTRODUCTION

IMAGE compression techniques, especially
nonreversible or lossy ones, have been known to grow
computationally more complex as they grow more
efficient, confirming the tenets of source coding
theorems in information theory that code for a
(stationary) source approaches optimality in the limit
of
infinite
computation
(source
length).
Notwithstanding he image coding technique called
embedded zero tree wavelet (EZW), introduced by
Shapiro, interrupted the simultaneous progression of
efficiency and complexity. This technique not only
was competitive in performance with the most
complex techniques, but was extremely fast in
execution and produced an embedded bit stream. With
an embedded bit stream, the reception of code bits can
be stopped at any point and the image can be
decompressed and reconstructed. Following that
significant work, we developed an alternative
exposition of the underlying principles of the EZW
technique.
EZW stands for ‘Embedded Zero tree
Wavelet’, which is abbreviated from the title of
Jerome Shapiro’s 1993article [4],”Embedded Image
Coding Using Zero trees of Wavelet Coefficients”.
EZW is a simple and effective image compression
algorithm, its output bit-stream ordered by importance.
Encoding was able to end at any location, so it allowed
achieving accurate rate or distortion. This algorithm
does not need to train and require pre-stored codebook.
In a word, it does not require any prior knowledge of
original image.
More improvements over EZW are achieved
by SPIHT, by Amir Said and William Pearlman, in
1996 article, "Set Partitioning in Hierarchical Trees"
[5]. In this method, more (wide-sense) zero trees are
efficiently found and represented by separating the
tree root from the tree, so making compression more
efficient. Experiments are, shown that the image
through the wavelet transform, the generally small [6],
www.ijera.com

so it will appear seriate "0" situation in quantify.
SPIHT does not adopt a special method to treat with it,
but direct output. In this paper, focus on this point,
propose a simple and effective method combined with
Huffman encode for further compression. A large
number of experimental results are shown that this
method saves a lot of bits in transmission, further
enhanced the compression performance.
.

II.

SPIHT ALGORITHM

A. Description of the algorithm
Set partitioning in hierarchical trees (SPIHT)
is an image compression algorithm that exploits the
inherent similarities across the subband in a wavelet
decomposition of an image. The algorithm codes the
most important wavelet transform coefficients first,
and transmits the bits so that an increasingly refined
copy of the original image can be obtained
progressively.
The
powerful
wavelet-based
image
compression method called Set Partitioning in
Hierarchical Trees (SPIHT), The SPIHT method is
not a simple extension of traditional methods for
image compression, and represents an important
advance in the field. Image data through the wavelet
decomposition, the coefficient of the distribution turn
into a tree. According to this feature, defining a data
structure: spatial orientation tree. 4-level wavelet
decomposition of the spatial orientation trees structure
are shown in Figure1.We can see that each coefficients
has four children except the ‘red’ marked coefficients
in the LL subband and the coefficients in the highest
subband (HL1;LH1; HH1).
The following set of coordinates of coefficients is used
to represent set partitioning method in SPIHT
algorithm. The location of coefficient is notated by (i,
j), where i and indicate row and column indices,
respectively

1669 | P a g e
G. Sreenivasulu et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1669-1672
H: Roots of the all spatial orientation trees
O(i, j) :Set of offspring of the coefficient (i, j), O(i, j)
={(2i, 2j), (2i, 2j + 1),(2i + 1, 2j), (2i + 1, 2j + 1)},
except (i, j) is in LL; When (i,j) is in LL subband, O(i;
j) is defined as:O(i, j) = {(i, j + wLL), (i + hLL, j), (i +
hLL, j + wLL)}, where wLL and hLL is the width and
height of the LL subband ,respectively.
D(i, j) :Set of all descendants of the coefficient (i, j),
L(i, j) : D(i, j) - O (i , j)

www.ijera.com

Entry in LIS as type A ;
2) Sorting Pass:
1. for each(i, j) ∈ LIP do:
(a) output S n (i , j)
(b) if S n (i , j) = 1 then move (i, j) to LSP and
output
Sign ( ci , j )
2. For each (i, j) ∈ LIS do:
(a) If (i, j) is type
A then i. output
Sn (D (i, j))
ii. If Sn (D (i; j)) = 1 then
A. for each (k, l) ∈ O (i, j)
output Sn(k; l)
f Sn(k, l) = 1 then append (k, l) to LSP,
output
sign (ck,l),and ck,l = ck,l- 2n . sign (ck,l)
else append (k; l) to LIP
B. move (i, j) to the end of LIS as type B
(b) if (i, j) is type
B then
i. output Sn(L(i,
j))
ii. If Sn(L(i, j)) = 1 then
append each (k, l) ∈ O(i, j) to the end of LIS
as type A
remove (i, j)from LSP
3) Refinement Pass:
1.
for each (i, j) in LSP, except those included
in the last sorting pass
Output the n-th MSB of ci, j ;

A significance function Sn (τ) which
decides the significance of the set of coordinates, τ,
with respect to the threshold 2n is defined by:
S n (τ )

1, if max ( i , j )∈ τ { ci , j } ≥ 2 n

4) Quantization Pass:
1. decrement n by 1
2. go to step 2)

0, else
where ci,

j

is the wavelet coefficients.

www.ijera.com

---------------->ENCODING
DECODING<-----------------------

Outp
ut

Algorithm: SPIHT
1) Initialization:
1. output n
2 max{c(i, j)}] ;
2. set LSP =φ ;
3. set LIP = (i, j) ∈ H;
4. set LIS = (i, j) ∈ H, where D(i; j) ≠
each

DWT

Algorithm
(SPIHT +
Huffman
Encoding)
Bit stream

In the algorithm, three ordered lists are used
to store the significance information during set
partitioning. List of insignificant sets (LIS), list of
insignificant pixels (LIP), and list of significant pixels
(LSP) are those three lists. Note that the term ‘pixel’ is
actually indicating wavelet coefficient if the set
partitioning algorithm is applied to a wavelet transf ormed image.

Inp
ut

IDWT

Decodi
ng

Fig1: block diagram of compression and
decompression process
φ and set

1670 | P a g e
G. Sreenivasulu et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1669-1672
Analyse of SPIHT algorithm
Here a concrete example to analyse the
output binary stream of SPIHT encoding. The
following is 3-level wavelet decomposition
coefficients of SPIHT encoding:
26
6
13
10
7
13
-12 7

www.ijera.com

do not participate in group and those
remainder bits direct output in end.

B.

Figure2 is shown the output bit stream structure
of Huffman encoding.
Number of remain bits

Bits stream

Remain Bits

Figure2: the bit stream structure of Huffman encoding
-7

7

6

4

3

4

6

-1

4

-4

4

-3

5

-7

3

9

2

-2

-2

0

4

-2

3

2

-5

9

-1

47

4

6

-2

2

3

0

-3

2

3

-2

0

4

2

-3

6

-4

3

6

3

6

2) The emergence of statistical probability of each
symbol grouping results is as follows:
P (‘000’) = 0.2144
P (‘001’) =0.14
P (‘010’) = 0
P (‘011’) =0.07
P (‘100’) = 0
P (‘101’) = 0.07
P (‘110’) = 0.14
P (‘111’) = 0.35
3) According to the probability of the above results,
using Huffman encoding, then obtain code word book,
as follow table1.
Table 1: Code word comparison table

5

11

5

6

0

3

-4

4

n = [log 2 max{c (i, j)}] =4, so, the initial
threshold
Value: T0=24, for T0, the output binary stream:
11100000000011110011101111111110001110111010
0,
Total 42 bits in all.
By the SPIHT encoding results, we can see that the
output bit stream with a large number of seriate "0"
situation, and along with the gradual deepening of
quantification, the situation will become much more
severity, so there will have a great of redundancy
when we direct output.
C.

Modified SPIHT Algorithm

For the output bit stream of SPIHT encoding with a
large number of seriate "0" situation ,we obtain a
conclusion by a lot of statistical analysis: ‘000’
appears with the greatest probability value , usually
will be about 1/4.Therefore, divide the binary output
stream of SPIHT every 3 bits as a group, every group
recorded as a symbol, a total of eight kinds of symbols,
statistical probability that they appear, and then
encoded using variable-length encoding naturally
reached the further compressed, in this paper, variablelength encoding is Huffman encoding.
Using the output bit stream of above example to
introduce the new encoding method process.
1) First, divide the binary output stream every 3
bits as a group: 110 000 000 001 111 001 110
111 111 111 000 111 011 101 in this process,
there will be remain 0, 1, 2 bits can not
participate. So, in order to unity, in the head of
the output bit stream of Huffman encoding
cost two bits to record the number of bits that

www.ijera.com

‘000’’00’
‘001’’01’
‘010’’11’
‘011’’010’

‘100’’011’
‘101’’0011’
‘110’’01111’
‘111’’111111’

Through the above code book we can get the
corresponding output stream: 00 01 11 010 011 0011
01111 111111, a total of 27 bits, the ‘10’ in the head is
binary of remainder bits’ number. The last two bits
‘00’ are the result of directly outputting remainder bits.
Compared with the original bit stream save 15 bits.
Decoding is inverse process of the abovementioned process.

III.

ANALYSIS OF EXPERIMENTAL
RESULTS

In order to verify the validity of this
algorithm, images usually using all are analyzed, we
use 5-level pyramids constructed with the 9/7-tap
filters.Table2 is shown the experiment results of two
standard 512×512 grayscale image Lena, Goldhill at
different rate. Average code length which is calculated
as follows:
8

L   p (i ) Li
i 1

Where p is the probability of symbols
appeared, Li is the length of word code.
From the experimental results, we can see
that values of L are less than 3, so we can achieve the
compression effect. For each image in the same rate
always the probability of each symbol appear flat, and
only small fluctuations, so saving the number of bits
are also pretty much the same thing. With the rate
increase word code length in average ( L ) will be an
increasing trend, but after the rate greater than 0.3bpp
the trending will be become very slowly, and more
value of rate more bits will be save.
1671 | P a g e
G. Sreenivasulu et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1669-1672
Image

Lena

Goldhill

Rate(bpp) 0.1
0.3
0.5
0.263
P(‘000’)
6
0.2362 0.2352

P(‘011’)

0.5

[4]

0.2457

0.220
5

[5]

0.1468
P(‘010’)

0.3

0.2521
P(‘001’)

0.1

0.1441

0.136
4
0.1393 0.1383
0.120
1
0.1229 0.1212 0.1271
0.100
1
0.1022 0.1028 0.0974

0.1276
0.0974

P(‘100’)

0.136
2
0.1397 0.1407
0.075
P(‘101’)
9
0.0840
0.0832
P(‘110’) 0.096
1
0.1021 0.1024
P(‘111’) 0.071
6
0.0738 0.0762
average code 2.883
length
9
2.9216 2.9242
the number
of output bits
by
26225 78650 131080
SPIHT
encoding
the number
of output bits
by
25430 76802 127986
the new
algorithm
encoding
the number
of saving
bits
795 1848 3094

IV.

0.145
4
0.128
2
0.100
8
0.146
1

0.1403

0.1419

0.0746

0.0767

0.0938

0.0954

0.0680

0.0713

2.8905

2.9023

0.081
6
0.099
2
0.078
2
2.939
3

26225

78647

76287

12864
2

747

2360

[7]

transform [J]. IEEE Trans. Image Processing
1992 1(2) 205-220.
Cheng Li-chi, Wang Hong-xia, Luo Yong.
Wavelet theory and applications. Beijing:
Science Press, 2004(Chinese).
J. M. SHAPIRO. Embedded image coding
using zerotree of wavelets coefficients [J].
IEEE Trans. Signal Processing 1993 41(12)
3445-3462.
Amir SAID William A.PEARLMAN. A new
fast and efficient image codec based on set
partitioning in hierarchical trees [J]. IEEE
Transactions on Circuits and Systems for
Video Technology 1996 6(3) 243-250.
FAN Qi-bin. Wavelet analysis. Wuhan:
Wuhan University Press, 2008.J. Breckling,
Ed., the Analysis of Directional Time Series:
Applications to Wind Speed and Direction,
ser. Lecture Notes in Statistics. Berlin,
Germany: Springer, 1989, vol. 61.

13108
0

25478

[6]

www.ijera.com

2438

CONCLUSION

Proposing a simple and effective method
combined with Huffman encoding for further
compression in this paper that saves a lot of bits in the
image data transmission. There are very wide ranges
of practical value for today that have a large number of
image data to be transmitted.

REFERENCES
[1]

[2]

[3]

M. Rabbani and P. W. Jones, Digital Image
Compression Techniques. Bellingham, WA:
SPIE Opt. Eng. Press, 1991.
Rafael C. GONZALEZ Richard E. WOODS.
Digital image processing: second ed [M].
Beijing Publishing House of Electronics
Industry 2002.
Marc ANTONINI Michel BARLAUD Pierre
MATHIEU et al. Image coding using wavelet

www.ijera.com

1672 | P a g e

Weitere ähnliche Inhalte

Was ist angesagt?

Improved Parallel Prefix Algorithm on OTIS-Mesh of Trees
Improved Parallel Prefix Algorithm on OTIS-Mesh of TreesImproved Parallel Prefix Algorithm on OTIS-Mesh of Trees
Improved Parallel Prefix Algorithm on OTIS-Mesh of TreesIDES Editor
 
Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...Ryutaroh Matsumoto
 
Dictionary based Image Compression via Sparse Representation
Dictionary based Image Compression via Sparse Representation  Dictionary based Image Compression via Sparse Representation
Dictionary based Image Compression via Sparse Representation IJECEIAES
 
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFICSIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFICijdms
 
Text Extraction from Image using Python
Text Extraction from Image using PythonText Extraction from Image using Python
Text Extraction from Image using Pythonijtsrd
 
Image compression using negative format
Image compression using negative formatImage compression using negative format
Image compression using negative formateSAT Publishing House
 
Image compression using negative format
Image compression using negative formatImage compression using negative format
Image compression using negative formateSAT Journals
 
Implementation of Polynomial – ONB I Basis Conversion - Jurnal Ilmiah Teknik ...
Implementation of Polynomial – ONB I Basis Conversion - Jurnal Ilmiah Teknik ...Implementation of Polynomial – ONB I Basis Conversion - Jurnal Ilmiah Teknik ...
Implementation of Polynomial – ONB I Basis Conversion - Jurnal Ilmiah Teknik ...Marisa Paryasto
 
Iaetsd a novel vlsi dht algorithm for a highly modular and parallel
Iaetsd a novel vlsi dht algorithm for a highly modular and parallelIaetsd a novel vlsi dht algorithm for a highly modular and parallel
Iaetsd a novel vlsi dht algorithm for a highly modular and parallelIaetsd Iaetsd
 
MODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTION
MODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTIONMODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTION
MODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTIONijcsit
 
Similarity-preserving hash for content-based audio retrieval using unsupervis...
Similarity-preserving hash for content-based audio retrieval using unsupervis...Similarity-preserving hash for content-based audio retrieval using unsupervis...
Similarity-preserving hash for content-based audio retrieval using unsupervis...IJECEIAES
 
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...IJERA Editor
 
IRJET- Image Captioning using Multimodal Embedding
IRJET-  	  Image Captioning using Multimodal EmbeddingIRJET-  	  Image Captioning using Multimodal Embedding
IRJET- Image Captioning using Multimodal EmbeddingIRJET Journal
 
Elliptic curve Cryptography and Diffie- Hellman Key exchange
Elliptic curve Cryptography and Diffie- Hellman Key exchangeElliptic curve Cryptography and Diffie- Hellman Key exchange
Elliptic curve Cryptography and Diffie- Hellman Key exchangeIOSRJM
 

Was ist angesagt? (17)

Improved Parallel Prefix Algorithm on OTIS-Mesh of Trees
Improved Parallel Prefix Algorithm on OTIS-Mesh of TreesImproved Parallel Prefix Algorithm on OTIS-Mesh of Trees
Improved Parallel Prefix Algorithm on OTIS-Mesh of Trees
 
20120140506008 2
20120140506008 220120140506008 2
20120140506008 2
 
Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...
 
E018212935
E018212935E018212935
E018212935
 
Dictionary based Image Compression via Sparse Representation
Dictionary based Image Compression via Sparse Representation  Dictionary based Image Compression via Sparse Representation
Dictionary based Image Compression via Sparse Representation
 
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFICSIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
 
Text Extraction from Image using Python
Text Extraction from Image using PythonText Extraction from Image using Python
Text Extraction from Image using Python
 
Image compression using negative format
Image compression using negative formatImage compression using negative format
Image compression using negative format
 
Image compression using negative format
Image compression using negative formatImage compression using negative format
Image compression using negative format
 
Implementation of Polynomial – ONB I Basis Conversion - Jurnal Ilmiah Teknik ...
Implementation of Polynomial – ONB I Basis Conversion - Jurnal Ilmiah Teknik ...Implementation of Polynomial – ONB I Basis Conversion - Jurnal Ilmiah Teknik ...
Implementation of Polynomial – ONB I Basis Conversion - Jurnal Ilmiah Teknik ...
 
Iaetsd a novel vlsi dht algorithm for a highly modular and parallel
Iaetsd a novel vlsi dht algorithm for a highly modular and parallelIaetsd a novel vlsi dht algorithm for a highly modular and parallel
Iaetsd a novel vlsi dht algorithm for a highly modular and parallel
 
MODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTION
MODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTIONMODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTION
MODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTION
 
Similarity-preserving hash for content-based audio retrieval using unsupervis...
Similarity-preserving hash for content-based audio retrieval using unsupervis...Similarity-preserving hash for content-based audio retrieval using unsupervis...
Similarity-preserving hash for content-based audio retrieval using unsupervis...
 
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
FPGA based Real-time Automatic Number Plate Recognition System for Modern Lic...
 
40120140501004
4012014050100440120140501004
40120140501004
 
IRJET- Image Captioning using Multimodal Embedding
IRJET-  	  Image Captioning using Multimodal EmbeddingIRJET-  	  Image Captioning using Multimodal Embedding
IRJET- Image Captioning using Multimodal Embedding
 
Elliptic curve Cryptography and Diffie- Hellman Key exchange
Elliptic curve Cryptography and Diffie- Hellman Key exchangeElliptic curve Cryptography and Diffie- Hellman Key exchange
Elliptic curve Cryptography and Diffie- Hellman Key exchange
 

Andere mochten auch

April 2012 - Made in Brazil
April 2012 - Made in BrazilApril 2012 - Made in Brazil
April 2012 - Made in BrazilFGV Brazil
 
Marketing Strategy cert
Marketing Strategy certMarketing Strategy cert
Marketing Strategy certTwila Arias
 
Colciencias y los recursos de inversión power point
Colciencias y los recursos de inversión power pointColciencias y los recursos de inversión power point
Colciencias y los recursos de inversión power pointjoel150211
 
Portafolios digitales y gestión del conocimiento (resumen del curso)
Portafolios digitales y gestión del conocimiento (resumen del curso)Portafolios digitales y gestión del conocimiento (resumen del curso)
Portafolios digitales y gestión del conocimiento (resumen del curso)Gabriela Morales
 
Computer Networking meets Social Psychology
Computer Networking meets Social PsychologyComputer Networking meets Social Psychology
Computer Networking meets Social PsychologyWaldir Moreira
 
The pit and the pendulum (1)
The pit and the pendulum (1)The pit and the pendulum (1)
The pit and the pendulum (1)Amelia Payne
 
“暗算の達人” で数字で話せる人を目指す
“暗算の達人”で数字で話せる人を目指す“暗算の達人”で数字で話せる人を目指す
“暗算の達人” で数字で話せる人を目指すbijikin
 
PA.3/4 แบบข้อเสนอในการพัฒนางานตามหน้าที่และความรับผิดชอบ (สายงานนิเทศการศึกษา)
PA.3/4 แบบข้อเสนอในการพัฒนางานตามหน้าที่และความรับผิดชอบ (สายงานนิเทศการศึกษา)PA.3/4 แบบข้อเสนอในการพัฒนางานตามหน้าที่และความรับผิดชอบ (สายงานนิเทศการศึกษา)
PA.3/4 แบบข้อเสนอในการพัฒนางานตามหน้าที่และความรับผิดชอบ (สายงานนิเทศการศึกษา)Teacher Sophonnawit
 
Layout cnab 240 posicoes set de 2009
Layout cnab 240 posicoes set de 2009Layout cnab 240 posicoes set de 2009
Layout cnab 240 posicoes set de 2009Gelivaldo Filho
 

Andere mochten auch (20)

Ki3517881791
Ki3517881791Ki3517881791
Ki3517881791
 
Kf3517721775
Kf3517721775Kf3517721775
Kf3517721775
 
Js3516731693
Js3516731693Js3516731693
Js3516731693
 
Tipos de software
Tipos de softwareTipos de software
Tipos de software
 
April 2012 - Made in Brazil
April 2012 - Made in BrazilApril 2012 - Made in Brazil
April 2012 - Made in Brazil
 
Тренаж по орфоэпии
Тренаж по орфоэпииТренаж по орфоэпии
Тренаж по орфоэпии
 
Marketing Strategy cert
Marketing Strategy certMarketing Strategy cert
Marketing Strategy cert
 
Colciencias y los recursos de inversión power point
Colciencias y los recursos de inversión power pointColciencias y los recursos de inversión power point
Colciencias y los recursos de inversión power point
 
Portafolios digitales y gestión del conocimiento (resumen del curso)
Portafolios digitales y gestión del conocimiento (resumen del curso)Portafolios digitales y gestión del conocimiento (resumen del curso)
Portafolios digitales y gestión del conocimiento (resumen del curso)
 
Computer Networking meets Social Psychology
Computer Networking meets Social PsychologyComputer Networking meets Social Psychology
Computer Networking meets Social Psychology
 
The pit and the pendulum (1)
The pit and the pendulum (1)The pit and the pendulum (1)
The pit and the pendulum (1)
 
“暗算の達人” で数字で話せる人を目指す
“暗算の達人”で数字で話せる人を目指す“暗算の達人”で数字で話せる人を目指す
“暗算の達人” で数字で話せる人を目指す
 
PA.3/4 แบบข้อเสนอในการพัฒนางานตามหน้าที่และความรับผิดชอบ (สายงานนิเทศการศึกษา)
PA.3/4 แบบข้อเสนอในการพัฒนางานตามหน้าที่และความรับผิดชอบ (สายงานนิเทศการศึกษา)PA.3/4 แบบข้อเสนอในการพัฒนางานตามหน้าที่และความรับผิดชอบ (สายงานนิเทศการศึกษา)
PA.3/4 แบบข้อเสนอในการพัฒนางานตามหน้าที่และความรับผิดชอบ (สายงานนิเทศการศึกษา)
 
Lx3520322036
Lx3520322036Lx3520322036
Lx3520322036
 
Mj3621112123
Mj3621112123Mj3621112123
Mj3621112123
 
Ho3513201325
Ho3513201325Ho3513201325
Ho3513201325
 
Dp35648654
Dp35648654Dp35648654
Dp35648654
 
Enio Cordeiro
Enio CordeiroEnio Cordeiro
Enio Cordeiro
 
2ª questão
2ª questão2ª questão
2ª questão
 
Layout cnab 240 posicoes set de 2009
Layout cnab 240 posicoes set de 2009Layout cnab 240 posicoes set de 2009
Layout cnab 240 posicoes set de 2009
 

Ähnlich wie Jr3516691672

Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014ijcsbi
 
IRJET- Wavelet Transform along with SPIHT Algorithm used for Image Compre...
IRJET-  	  Wavelet Transform along with SPIHT Algorithm used for Image Compre...IRJET-  	  Wavelet Transform along with SPIHT Algorithm used for Image Compre...
IRJET- Wavelet Transform along with SPIHT Algorithm used for Image Compre...IRJET Journal
 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganographyIAEME Publication
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Securable image compression using spiht algorithm
Securable image compression using spiht algorithmSecurable image compression using spiht algorithm
Securable image compression using spiht algorithmIAEME Publication
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
New Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSBNew Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSBEditor IJCATR
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueIJERA Editor
 
A STUDY OF IMAGE COMPRESSION BASED TRANSMISSION ALGORITHM USING SPIHT FOR LOW...
A STUDY OF IMAGE COMPRESSION BASED TRANSMISSION ALGORITHM USING SPIHT FOR LOW...A STUDY OF IMAGE COMPRESSION BASED TRANSMISSION ALGORITHM USING SPIHT FOR LOW...
A STUDY OF IMAGE COMPRESSION BASED TRANSMISSION ALGORITHM USING SPIHT FOR LOW...acijjournal
 
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREMINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREAIRCC Publishing Corporation
 
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREMINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREijcsit
 
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...AM Publications,India
 
IRJET- RESULT:Wavelet Transform along with SPIHT Algorithm Used for Image Com...
IRJET- RESULT:Wavelet Transform along with SPIHT Algorithm Used for Image Com...IRJET- RESULT:Wavelet Transform along with SPIHT Algorithm Used for Image Com...
IRJET- RESULT:Wavelet Transform along with SPIHT Algorithm Used for Image Com...IRJET Journal
 
Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2IAEME Publication
 
Comparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression TechniquesComparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression Techniquessipij
 

Ähnlich wie Jr3516691672 (20)

Er24902905
Er24902905Er24902905
Er24902905
 
B046050711
B046050711B046050711
B046050711
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014
 
IRJET- Wavelet Transform along with SPIHT Algorithm used for Image Compre...
IRJET-  	  Wavelet Transform along with SPIHT Algorithm used for Image Compre...IRJET-  	  Wavelet Transform along with SPIHT Algorithm used for Image Compre...
IRJET- Wavelet Transform along with SPIHT Algorithm used for Image Compre...
 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganography
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Securable image compression using spiht algorithm
Securable image compression using spiht algorithmSecurable image compression using spiht algorithm
Securable image compression using spiht algorithm
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
New Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSBNew Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSB
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
 
An32272275
An32272275An32272275
An32272275
 
A STUDY OF IMAGE COMPRESSION BASED TRANSMISSION ALGORITHM USING SPIHT FOR LOW...
A STUDY OF IMAGE COMPRESSION BASED TRANSMISSION ALGORITHM USING SPIHT FOR LOW...A STUDY OF IMAGE COMPRESSION BASED TRANSMISSION ALGORITHM USING SPIHT FOR LOW...
A STUDY OF IMAGE COMPRESSION BASED TRANSMISSION ALGORITHM USING SPIHT FOR LOW...
 
B070306010
B070306010B070306010
B070306010
 
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREMINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
 
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREMINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
 
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
 
IRJET- RESULT:Wavelet Transform along with SPIHT Algorithm Used for Image Com...
IRJET- RESULT:Wavelet Transform along with SPIHT Algorithm Used for Image Com...IRJET- RESULT:Wavelet Transform along with SPIHT Algorithm Used for Image Com...
IRJET- RESULT:Wavelet Transform along with SPIHT Algorithm Used for Image Com...
 
Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2
 
F010232834
F010232834F010232834
F010232834
 
Comparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression TechniquesComparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression Techniques
 

Kürzlich hochgeladen

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Kürzlich hochgeladen (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Jr3516691672

  • 1. G. Sreenivasulu et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1669-1672 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Effective Compression in Digital Images with SPIHT Algorithm and Entropy G. Sreenivasulu, B. Srinivasa Rao Assistant Professor Sree Vidyanikethan Engg.College (Autonomous) Tirupati, Andhra Pradesh Assistant Professor Sree Vidyanikethan Engg.College (Autonomous) Tirupati, Andhra Pradesh. Abstract Image compression is achieved by removing data redundancy while preserving information content. SPIHT is computationally very fast and among the best image compression algorithms known today. According to statistic analysis of the output binary stream of SPIHT encoding, propose a simple and effective method combined with Entropy for further compression that saves a lot of bits in the image data transmission. Keywords — Encoding; DWT; SPIHT; Huffman I. INTRODUCTION IMAGE compression techniques, especially nonreversible or lossy ones, have been known to grow computationally more complex as they grow more efficient, confirming the tenets of source coding theorems in information theory that code for a (stationary) source approaches optimality in the limit of infinite computation (source length). Notwithstanding he image coding technique called embedded zero tree wavelet (EZW), introduced by Shapiro, interrupted the simultaneous progression of efficiency and complexity. This technique not only was competitive in performance with the most complex techniques, but was extremely fast in execution and produced an embedded bit stream. With an embedded bit stream, the reception of code bits can be stopped at any point and the image can be decompressed and reconstructed. Following that significant work, we developed an alternative exposition of the underlying principles of the EZW technique. EZW stands for ‘Embedded Zero tree Wavelet’, which is abbreviated from the title of Jerome Shapiro’s 1993article [4],”Embedded Image Coding Using Zero trees of Wavelet Coefficients”. EZW is a simple and effective image compression algorithm, its output bit-stream ordered by importance. Encoding was able to end at any location, so it allowed achieving accurate rate or distortion. This algorithm does not need to train and require pre-stored codebook. In a word, it does not require any prior knowledge of original image. More improvements over EZW are achieved by SPIHT, by Amir Said and William Pearlman, in 1996 article, "Set Partitioning in Hierarchical Trees" [5]. In this method, more (wide-sense) zero trees are efficiently found and represented by separating the tree root from the tree, so making compression more efficient. Experiments are, shown that the image through the wavelet transform, the generally small [6], www.ijera.com so it will appear seriate "0" situation in quantify. SPIHT does not adopt a special method to treat with it, but direct output. In this paper, focus on this point, propose a simple and effective method combined with Huffman encode for further compression. A large number of experimental results are shown that this method saves a lot of bits in transmission, further enhanced the compression performance. . II. SPIHT ALGORITHM A. Description of the algorithm Set partitioning in hierarchical trees (SPIHT) is an image compression algorithm that exploits the inherent similarities across the subband in a wavelet decomposition of an image. The algorithm codes the most important wavelet transform coefficients first, and transmits the bits so that an increasingly refined copy of the original image can be obtained progressively. The powerful wavelet-based image compression method called Set Partitioning in Hierarchical Trees (SPIHT), The SPIHT method is not a simple extension of traditional methods for image compression, and represents an important advance in the field. Image data through the wavelet decomposition, the coefficient of the distribution turn into a tree. According to this feature, defining a data structure: spatial orientation tree. 4-level wavelet decomposition of the spatial orientation trees structure are shown in Figure1.We can see that each coefficients has four children except the ‘red’ marked coefficients in the LL subband and the coefficients in the highest subband (HL1;LH1; HH1). The following set of coordinates of coefficients is used to represent set partitioning method in SPIHT algorithm. The location of coefficient is notated by (i, j), where i and indicate row and column indices, respectively 1669 | P a g e
  • 2. G. Sreenivasulu et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1669-1672 H: Roots of the all spatial orientation trees O(i, j) :Set of offspring of the coefficient (i, j), O(i, j) ={(2i, 2j), (2i, 2j + 1),(2i + 1, 2j), (2i + 1, 2j + 1)}, except (i, j) is in LL; When (i,j) is in LL subband, O(i; j) is defined as:O(i, j) = {(i, j + wLL), (i + hLL, j), (i + hLL, j + wLL)}, where wLL and hLL is the width and height of the LL subband ,respectively. D(i, j) :Set of all descendants of the coefficient (i, j), L(i, j) : D(i, j) - O (i , j) www.ijera.com Entry in LIS as type A ; 2) Sorting Pass: 1. for each(i, j) ∈ LIP do: (a) output S n (i , j) (b) if S n (i , j) = 1 then move (i, j) to LSP and output Sign ( ci , j ) 2. For each (i, j) ∈ LIS do: (a) If (i, j) is type A then i. output Sn (D (i, j)) ii. If Sn (D (i; j)) = 1 then A. for each (k, l) ∈ O (i, j) output Sn(k; l) f Sn(k, l) = 1 then append (k, l) to LSP, output sign (ck,l),and ck,l = ck,l- 2n . sign (ck,l) else append (k; l) to LIP B. move (i, j) to the end of LIS as type B (b) if (i, j) is type B then i. output Sn(L(i, j)) ii. If Sn(L(i, j)) = 1 then append each (k, l) ∈ O(i, j) to the end of LIS as type A remove (i, j)from LSP 3) Refinement Pass: 1. for each (i, j) in LSP, except those included in the last sorting pass Output the n-th MSB of ci, j ; A significance function Sn (τ) which decides the significance of the set of coordinates, τ, with respect to the threshold 2n is defined by: S n (τ ) 1, if max ( i , j )∈ τ { ci , j } ≥ 2 n 4) Quantization Pass: 1. decrement n by 1 2. go to step 2) 0, else where ci, j is the wavelet coefficients. www.ijera.com ---------------->ENCODING DECODING<----------------------- Outp ut Algorithm: SPIHT 1) Initialization: 1. output n 2 max{c(i, j)}] ; 2. set LSP =φ ; 3. set LIP = (i, j) ∈ H; 4. set LIS = (i, j) ∈ H, where D(i; j) ≠ each DWT Algorithm (SPIHT + Huffman Encoding) Bit stream In the algorithm, three ordered lists are used to store the significance information during set partitioning. List of insignificant sets (LIS), list of insignificant pixels (LIP), and list of significant pixels (LSP) are those three lists. Note that the term ‘pixel’ is actually indicating wavelet coefficient if the set partitioning algorithm is applied to a wavelet transf ormed image. Inp ut IDWT Decodi ng Fig1: block diagram of compression and decompression process φ and set 1670 | P a g e
  • 3. G. Sreenivasulu et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1669-1672 Analyse of SPIHT algorithm Here a concrete example to analyse the output binary stream of SPIHT encoding. The following is 3-level wavelet decomposition coefficients of SPIHT encoding: 26 6 13 10 7 13 -12 7 www.ijera.com do not participate in group and those remainder bits direct output in end. B. Figure2 is shown the output bit stream structure of Huffman encoding. Number of remain bits Bits stream Remain Bits Figure2: the bit stream structure of Huffman encoding -7 7 6 4 3 4 6 -1 4 -4 4 -3 5 -7 3 9 2 -2 -2 0 4 -2 3 2 -5 9 -1 47 4 6 -2 2 3 0 -3 2 3 -2 0 4 2 -3 6 -4 3 6 3 6 2) The emergence of statistical probability of each symbol grouping results is as follows: P (‘000’) = 0.2144 P (‘001’) =0.14 P (‘010’) = 0 P (‘011’) =0.07 P (‘100’) = 0 P (‘101’) = 0.07 P (‘110’) = 0.14 P (‘111’) = 0.35 3) According to the probability of the above results, using Huffman encoding, then obtain code word book, as follow table1. Table 1: Code word comparison table 5 11 5 6 0 3 -4 4 n = [log 2 max{c (i, j)}] =4, so, the initial threshold Value: T0=24, for T0, the output binary stream: 11100000000011110011101111111110001110111010 0, Total 42 bits in all. By the SPIHT encoding results, we can see that the output bit stream with a large number of seriate "0" situation, and along with the gradual deepening of quantification, the situation will become much more severity, so there will have a great of redundancy when we direct output. C. Modified SPIHT Algorithm For the output bit stream of SPIHT encoding with a large number of seriate "0" situation ,we obtain a conclusion by a lot of statistical analysis: ‘000’ appears with the greatest probability value , usually will be about 1/4.Therefore, divide the binary output stream of SPIHT every 3 bits as a group, every group recorded as a symbol, a total of eight kinds of symbols, statistical probability that they appear, and then encoded using variable-length encoding naturally reached the further compressed, in this paper, variablelength encoding is Huffman encoding. Using the output bit stream of above example to introduce the new encoding method process. 1) First, divide the binary output stream every 3 bits as a group: 110 000 000 001 111 001 110 111 111 111 000 111 011 101 in this process, there will be remain 0, 1, 2 bits can not participate. So, in order to unity, in the head of the output bit stream of Huffman encoding cost two bits to record the number of bits that www.ijera.com ‘000’’00’ ‘001’’01’ ‘010’’11’ ‘011’’010’ ‘100’’011’ ‘101’’0011’ ‘110’’01111’ ‘111’’111111’ Through the above code book we can get the corresponding output stream: 00 01 11 010 011 0011 01111 111111, a total of 27 bits, the ‘10’ in the head is binary of remainder bits’ number. The last two bits ‘00’ are the result of directly outputting remainder bits. Compared with the original bit stream save 15 bits. Decoding is inverse process of the abovementioned process. III. ANALYSIS OF EXPERIMENTAL RESULTS In order to verify the validity of this algorithm, images usually using all are analyzed, we use 5-level pyramids constructed with the 9/7-tap filters.Table2 is shown the experiment results of two standard 512×512 grayscale image Lena, Goldhill at different rate. Average code length which is calculated as follows: 8 L   p (i ) Li i 1 Where p is the probability of symbols appeared, Li is the length of word code. From the experimental results, we can see that values of L are less than 3, so we can achieve the compression effect. For each image in the same rate always the probability of each symbol appear flat, and only small fluctuations, so saving the number of bits are also pretty much the same thing. With the rate increase word code length in average ( L ) will be an increasing trend, but after the rate greater than 0.3bpp the trending will be become very slowly, and more value of rate more bits will be save. 1671 | P a g e
  • 4. G. Sreenivasulu et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1669-1672 Image Lena Goldhill Rate(bpp) 0.1 0.3 0.5 0.263 P(‘000’) 6 0.2362 0.2352 P(‘011’) 0.5 [4] 0.2457 0.220 5 [5] 0.1468 P(‘010’) 0.3 0.2521 P(‘001’) 0.1 0.1441 0.136 4 0.1393 0.1383 0.120 1 0.1229 0.1212 0.1271 0.100 1 0.1022 0.1028 0.0974 0.1276 0.0974 P(‘100’) 0.136 2 0.1397 0.1407 0.075 P(‘101’) 9 0.0840 0.0832 P(‘110’) 0.096 1 0.1021 0.1024 P(‘111’) 0.071 6 0.0738 0.0762 average code 2.883 length 9 2.9216 2.9242 the number of output bits by 26225 78650 131080 SPIHT encoding the number of output bits by 25430 76802 127986 the new algorithm encoding the number of saving bits 795 1848 3094 IV. 0.145 4 0.128 2 0.100 8 0.146 1 0.1403 0.1419 0.0746 0.0767 0.0938 0.0954 0.0680 0.0713 2.8905 2.9023 0.081 6 0.099 2 0.078 2 2.939 3 26225 78647 76287 12864 2 747 2360 [7] transform [J]. IEEE Trans. Image Processing 1992 1(2) 205-220. Cheng Li-chi, Wang Hong-xia, Luo Yong. Wavelet theory and applications. Beijing: Science Press, 2004(Chinese). J. M. SHAPIRO. Embedded image coding using zerotree of wavelets coefficients [J]. IEEE Trans. Signal Processing 1993 41(12) 3445-3462. Amir SAID William A.PEARLMAN. A new fast and efficient image codec based on set partitioning in hierarchical trees [J]. IEEE Transactions on Circuits and Systems for Video Technology 1996 6(3) 243-250. FAN Qi-bin. Wavelet analysis. Wuhan: Wuhan University Press, 2008.J. Breckling, Ed., the Analysis of Directional Time Series: Applications to Wind Speed and Direction, ser. Lecture Notes in Statistics. Berlin, Germany: Springer, 1989, vol. 61. 13108 0 25478 [6] www.ijera.com 2438 CONCLUSION Proposing a simple and effective method combined with Huffman encoding for further compression in this paper that saves a lot of bits in the image data transmission. There are very wide ranges of practical value for today that have a large number of image data to be transmitted. REFERENCES [1] [2] [3] M. Rabbani and P. W. Jones, Digital Image Compression Techniques. Bellingham, WA: SPIE Opt. Eng. Press, 1991. Rafael C. GONZALEZ Richard E. WOODS. Digital image processing: second ed [M]. Beijing Publishing House of Electronics Industry 2002. Marc ANTONINI Michel BARLAUD Pierre MATHIEU et al. Image coding using wavelet www.ijera.com 1672 | P a g e