1 Block Truncation Coding Using Pattern Fitting Source: Pattern Recognition, vol.37, 2004, pp.2131-2139 Authors: Bibhas Chandra Dhara, Bhabatosh Chanda.

Slides:



Advertisements
Similar presentations
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Advertisements

Wavelet transform and SPIHT 林明德. Wavelet transform & SPIHT Wavelet transform  濾波器組  程式功能  額外資訊 SPIHT  將不同功能的 SPIHT 做整合  用於各種長寬的圖檔  適用於 DSC 的 SPIHT.
Matlab Assignment Due Assignment 兩個 matlab 程式 : Eigenface : Eigenvector 和 eigenvalue 的應用. Fractal : Affine transform( rotation, translation,
7.1 背景介紹 7.2 多解析度擴展 7.3 一維小波轉換 7.4 快速小波轉換 7.5 二維小波轉換 7.6 小波封包
Distributed Video Coding. Outline Distributed video coding Lossless compression Lossy compression Low complexity video encoding Distributed image coding.
公司加入市場的決定. 定義  平均成本 = 總成本 ÷ 生產數量 = 每一單位產量所耗的成本  平均固定成本 = 總固定成本 ÷ 生產數量  平均變動成本 = 總變動成本 ÷ 生產數量.
研究資料的分析. 資料分析的基本策略  General data analysis strategies 1.Sketching ideas 2.Taking notes 3.Summarize field nores 4.Getting feedback on ideas 5.Working with.
Fractal Image Compression Lossy Looking for “local” similarities PIFS -- Partitioned Iteration Function system High compression ratio and high quality.
H.264 Motion Estimation Implement in Equator DSP Shu-Fan Chang 2003/10/29 音 視 訊 專 題音 視 訊 專 題.
Cluster Analysis 目的 – 將資料分成幾個相異性最大的群組 基本問題 – 如何衡量事務之間的相似性 – 如何將相似的資料歸入同一群組 – 如何解釋群組的特性.
Teacher : Ing-Jer Huang TA : Chien-Hung Chen 2015/6/30 Course Embedded Systems : Principles and Implementations Weekly Preview Question CH7.1~CH /12/26.
Distribute Video Coding 林明德. Lossless Compression 不考慮 X 和 Y 的相關性,直接傳送 X 和 Y 各需要使用 3bits ,總共傳出 的 bit 數為 6bits 。 (1) 考慮 X 和 Y 的相關性 (2) 將 Y 直接傳出,使用 3bits.
1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(
1 Lossless DNA Microarray Image Compression Source: Thirty-Seventh Asilomar Conference on Signals, Systems and Computers, Vol. 2, Nov. 2003, pp
IMAGE COMPRESSION USING BTC Presented By: Akash Agrawal Guided By: Prof.R.Welekar.
1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
1 Proteomics: APPROACHES AND IMAGE ANALYSIS TOOLS FOR DRUG DISCOVERY Authors: Sophia R. HE, Edmond J. Breen and Sybille M. N. Hunt Source: ICME 2003, pp.
Improvements to the JPEG-LS prediction scheme Authors: S. Bedi, E. A. Edirisinghe, and G. Grecos Source : Image and Vision Computing. Vol. 22, No. 1, 2004,
Partition and multi-path transmission-An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network Author: X. X. Ma, and Z. G.
1 A connection management protocol for promoting cooperation in Peer-to-Peer networks Authors: Murat Karakaya, Ibrahim Korpeoglu, and Ozgur Ulusoy Source:
Multiple-description iterative coding image watermarking Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 20, No. 4, pp , 2010.
1 Source: Journal of Chemical Information & Computer Sciences, 2003, vol.43, pp Authors: K. Kaczmarek, B. Walczak, S. de Jong, and B. G. M. Vandeginste.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
1 Biometric template selection and update: a case study in fingerprints Source:Pattern Recognition, Vol. 37, 2004, pp Authors: Umut Uludag, Arun.
Local Correlation-based Fingerprint Matching
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Visual Cryptography for Gray-Level Images by Dithering Techniques
1 Reversible and lossless data hiding in the integer wavelet transform domain (Review) Authors: S. Yousefi, H. R. Rabiee, E. Yousefi, and M. Ghanbari Speaker:
數位影像中熵的計算與應用 義守大學 資訊工程學系 黃健興. Outline Entropy Definition Entropy of images Applications Visual Surveillance System Background Extraction Conclusions.
1 Iterative Joint Source-Channel Soft-Decision Sequential Decoding Algorithms for Parallel Concatenated Variable Length Code and Convolutional Code Reporter.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Advisor: Chang, Chin-Chen Student: Chen, Chang-Chu
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
A steganographic method for digital images using side match
Image segmentation using GMM
Lossy Compression of DNA Microarray Images
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Centrality Bias Measure for High Density QR Code Module Recognition
Source :Journal of visual Communication and Image Representation
JPEG implementation and improvement
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Source: IEEE Access, Vol. 6, Dec. 2017, pp
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
第 六 章 BTC與中國書法壓縮 6-.
Dynamic embedding strategy of VQ-based information hiding approach
Hung, K. -L. and Chang, C. -C. , IEE Image and Signal Processing, vol
Partial reversible data hiding scheme using (7, 4) hamming code
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Data hiding method using image interpolation
Hung, K. -L. and Chang, C. -C. , IEE Image and Signal Processing, vol
EarthTour Presentations
第 八 章 區塊式VIDEO影像壓縮 8-.
Source: Pattern Recognition Letters 29 (2008)
Partial reversible data hiding scheme using (7, 4) hamming code
Multi-Tier and Multi-Bit Reversible Data Hiding with Contents Characteristics Source : Journal of Information Hiding and Multimedia Signal Processing, Volume.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: IEEE Transactions on multimedia, Vol. 21, No
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
An Image Quality Evaluation Method Based on Digital Watermarking
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
Presentation transcript:

1 Block Truncation Coding Using Pattern Fitting Source: Pattern Recognition, vol.37, 2004, pp Authors: Bibhas Chandra Dhara, Bhabatosh Chanda Speaker: Shu-Fen Chiou( 邱淑芬 ) Date: 2004/09/08

2 Outline Introduction BTC (Block Truncation Coding) Purposed method Experimental results Conclusions Comments

3 Introduction Since 1970s the block truncation coding (BTC) has been studied a lot. High PSNR but low compression ration. A modified scheme of BTC is proposed to achieve high compression ration and keeping PSNR as high as possible.

4 BTC (1/3)

5 BTC (2/3)  4 block Bit pattern

6 BTC (3/3) (a) Original image (b) Reconstructed image with conventional BTC(PSNR=32.89 and bpp=2)

7 Purposed method 將影像分成 不重疊的 n n 方塊 Pattern fitting Encoding the block Entropy coding and send 原影像 receive 重建影像方塊組成重建影像 編碼端 解碼端

8 Pattern fitting (1/4) Set of two-level patterns Pattern book

9 Pattern fitting (2/4)  4 block

 4 block Pattern fitting (3/4)

11 Pattern fitting (4/4) Output image after pattern fitting

12 Encoding the block (1/2) Considering entropy coding for and 8-bits for A

13 Encoding the block (2/2)

14 Reconstruction

15 Experimental results Original imageReconstructed image

16 Experimental results Original imageReconstructed image

17 Experimental results Conventional BTC (PSNR=32.89 and bpp=2) Purposed method (PSNR=31.59 and bpp=0.64)

18 Experimental results Experimental result of proposed method and others

19 Conclusions Instead of determining bit-pattern for a block, an optimum bit-pattern is selected from a pattern-book. Our method is presented to achieve higher compression ration and keeping PSNR as high as possible.

20 Comments 如何決定 w i ? 計算壓縮率時, 是否也應考慮 Pattern book?