SlideShare a Scribd company logo
1 of 8
Download to read offline
David C. Wyld et al. (Eds) : CST, ITCS, JSE, SIP, ARIA, DMS - 2014
pp. 271–278, 2014. © CS & IT-CSCP 2014 DOI : 10.5121/csit.2014.4125
FINGERPRINTS IMAGE COMPRESSION BY
WAVE ATOMS
Mustapha Delassi and Amina Serir.
LTIR, Faculté d'électronique et d'informatique, USTHB
BP 32 EI Alia, bab ezzouar, 16111 Alger, Algerie
ABSTRACT
The fingerprint images compression based on geometric transformed presents important
research topic, these last year’s many transforms have been proposed to give the best
representation to a particular type of image “fingerprint image”, like classics wavelets and
wave atoms. In this paper we shall present a comparative study between this transforms, in
order to use them in compression. The results show that for fingerprint images, the wave atom
offers better performance than the current transform based compression standard. The wave
atoms transformation brings a considerable contribution on the compression of fingerprints
images by achieving high values of ratios compression and PSNR, with a reduced number of
coefficients. In addition, the proposed method is verified with objective and subjective testing.
KEYWORDS
Image, compression, fingerprint, wavelets, wave atoms, WSQ.
1. INTRODUCTION
The fundamental goal of image compression is to obtain the best possible image quality at an
allocated storage capacity. For this, data compression is one of the major challenges that are used
in the majority of digital applications and specifically in the field of biometric "fingerprint",
which presents the centre of interest in our work. The overall process of image compression
through a series of steps: transformation, quantization and coding. The diversity at the steps led to
the birth of different compression standards according to the desired application.
In image compression, it is important to get the ability of representing in a very simple way the
data or the information with the minimum possible elements with allowing a loss of information,
for this, the transformation has duel contribution, it decorrelates the image components and
allows identifying the redundancy. Second it offers a high level of compactness of the energy in
the spatial frequency domain. There have been several transforms used in data compression,
Discrete Fourier Transform (DFT) and the DCT (Discrete cosines transform), DWT (Discrete
wavelets transform) for images compression.
Wavelets have been widely used in image processing, such as denoising and image compression
[1]. The success of wavelets with the JPEG2000 standard, and the DCT with the JPEG standard
was great, but its performance is limited to a certain type of images, this is why some other
standard dedicated to compression of fingerprint images are appeared, one of them is, the FBI
272 Computer Science & Information Technology (CS & IT)
fingerprint image compression standard, the wavelet scalar quantization (WSQ), which is based
on optimized decomposition of wavelet.
In our work we propose an algorithm for fingerprint image compression using wave atoms
decomposition, compared with WSQ standard results, in order to justify the contribution that can
bring wave atoms transformation for fingerprint image compression.
The remainder of this paper is divided into 4 sections. Section 2 discusses the wavelets and WSQ
standard, wave atoms transform implementation details and the proposed method for fingerprint
image compression is described in section 3. Experimental results are discussed in section 4 and
section 5 details concluding remarks followed by acknowledgment and references.
2. WSQ STANDARD
In 1993, the FBI (Federal Bureau of Investigation) has developed a standard for compressing
fingerprint images and reconstruction based on wavelet transforms, the fingerprint image is
decomposed using 2D DWT, the wavelets used are the biorthogonal 9/7 discrete wavelet
transform (DWT), by decomposing the image into four sub-bands of lower size in every level.
The structure of the tree decomposition can be determined by applying different tests on several
reference images. The tests concluded that the best tree consists of 64 sub bands [2]. These sub-
bands are further decomposed in to sets which grouped the same levels of decomposition, then
quantized and coded. The quantization used for each sub-bands is, the uniform scalar quantization
with dead zone, and then encoded using Huffman algorithm and RLE (Run Length Encoding).
The WSQ compression technique can compress fingerprint images with compression ratio
ranging from 10 to 1 and 20 to 1 [2]. However, despite that the wavelet transform is effective for
the detection of isotropic structures; it’s not optimal for the analysis of anisotropic objects in the
image (i.e., lines, contours), because they fail to follow the direction of this edge. To this effect,
new multiscale geometric transforms so-called second generation have been developed, such as
ridgelets [3], contourlets [4], curvelets [5], and more recently proposed, the wave atoms, which
all incorporate the notion of directionality.
3. WAVE ATOMS
Wave atoms are a recent addition to the collection of mathematical transforms for harmonic
computational analysis. Wave atoms are a variant of wavelet packets, they have a high frequency
localization that cannot be achieved using a filter bank based on wavelet packets and curvelet
Gabor atoms. Wave atoms precisely interpolate between Gabor atoms [6] (constant support) and
directional wavelets [7] (wavelength ~ diameter) in the sense that the period of oscillations of
each wave packet (wavelength) is related to the size of essential support by the parabolic scaling
i.e. wavelength ~ (diameter)2.
Different transforms based on wavelet packet, need to be represented as 'phase-space tiling', there
are two different parameters α, which represent whether the multi-scale decomposition is , and β-
directional capacity if it is isotropic, Wavelets (including Multi Resolution Analysis [5],
directional [8] and complex [9]) correspond to α = 1 β = 1, for ridgelets [10] α = 1, β = 0, Gabor
transform α = 1, β = 0 and curvelets [3] correspond to α = 1, β = 1/2. Wave atoms are defined for
α = 1, β = 1/2. Figure 1 illustrates this classification [4].
Computer Science & Information Technology (CS & IT) 273
Figure 1. Diagram of (α ,β) [Hadd 2009]
3.1 1D discrete wave atoms
Wave atoms are tensor products of a special type of 1D wave packets. )(, x
j
nmψ is a one-
dimensional family of real-valued wave packets, where 0,0 ≥≥ mj and Ζ∈n , cantered in
frequency around ± ωj,m=2π Jm, with j
Cm
j
C 2221 ≤≤ ,and centred in space around xj,n=2-jn. One-
dimensional version of the parabolic scaling states that the support of )(,ˆ ωψ
j
nm
is of length O(2j)
while ωj,m= O(22j). Filter bank-based wavelet packets is considered as a potential definition of
an orthonormal basis satisfying these localization properties. The wavelet packet tree, defining
the partitioning of the frequency axis in 1D, can be chosen to have depth j when the frequency is
22j. However, there is a problem associated with standard wavelet packets, that the direction in
which they meet the frequency localization is rather weak [9].
Dyadic dilates and translates of 0
ˆmω on the frequency axes are combined and bases function,
written as:
)2(
022)2()(, nx
j
m
j
n
j
x
j
mx
j
nm −=
−
−= ψψψ
(1)
The coefficients cj,m,n, for each wave number ωj,m,n, are obtained as a decimated convolution at
scale 2-j.
dxxun
j
x
j
mnmjc ∫
−
−= )()2(,, ψ (2)
By Plancherel’s theorem,
ωωωψ du
j
m
ji
enmjc ∫
∧∧−
= )()(
2
,,
(3)
Assuming that the function u is accurately discretized xk = kh, h=1/N, k =1....N, then up to some
small truncation error:
274 Computer Science & Information Technology (CS & IT)
∑
+
−=
∧∧−
=
)2:1:12(2
)()(
2
,, NNk
kuk
j
m
ji
e
D
nmjc
π
ψ
(4)
This equation makes sense for couples (j,m) for which the support of )(ˆ kj
mψ lies entirely inside
the interval [-πn,πn], so we may write k ∈ 2πZ.
3.2.2 D discrete wave atoms
A two-dimensional orthonormal basis function with 4 bumps in frequency plane is formed by
individually taking products of 1D wave packets. Mathematical formulation and implementations
for 1D case are detailed in the previous section. 2D wave atoms are indexed by µ=(j,m,n), where
m=(m1,m2) and n=(n1,n2). Construction is not a simple tensor product since there is only one
scale subscript j. This is similar to the non-standard or multiresolution analysis wavelet bases
where the point is to enforce same scale in both directions in order to retain an isotropic aspect
ratio. Eq. (1) is modified in 2D as:
)222(
2
)121(
1
)2,1( n
j
x
j
mn
j
x
j
mxxµ
−
−
−
−=
+
ψψϕ (5)
The Fourier transform is also separable, namely:
222
)1(
2
ˆ112
)1(
1
ˆ)2,1(ˆ
ω
ωψ
ω
ωψωωϕ
nji
e
j
m
nji
e
j
mµ
−−
=
+ (6)
)222(
2
)121(
1
)2,1( n
j
x
j
mHn
j
x
j
mHxxµ
−
−
−
−=
−
ψψϕ (7)
The recombination between the relations (6) and (7), by dual orthonormal basis give:
2
)2(
,
2
)1(
−
−
+
=
−
+
+
=
µµ
µ
µµ
µ
ϕϕ
ϕ
ϕϕ
ϕ
(8)
provides basis functions with two bumps in the frequency plane, symmetric with respect to the
origin, hence directional wave packets (oscillating in one single direction). Together,
,
)2()1(
µandµ ϕϕ form the wave atom frame and may be denoted jointly as
µϕ . The price to pay in
considering both ,
)2()1(
µandµ ϕϕ is an increase of a factor 2 in the redundancy.
Wave atom algorithm is based on the apparent generalization of the 1D wrapping strategy to two
dimensions and its complexity is O (N2 Log N).
Figure 2 represents the wave atom tiling of the special frequency plane. The size of the squares
doubles when the scale j increases by 1. At a given scale j, squares are indexed by m1, m2
starting from zero near the axes.
Computer Science & Information Technology (CS & IT) 275
Figure 2. wave atom tiling of the frequency plane
4. RESULUTS AND DISCUTION
4.1 Transforms studies
Several fingerprint images compression standards was used in order to reduce their size, quoting
JPEG with CDT transforms, WSQ, and JPEG 2000 with DWT transforms, wavelet transform has
brought a significant contribution, but for the feature of the fingerprint images, these
transformations have not given a good compression results, for this, other transforms was used to
better characterize the fingerprints images.
Measures such as MSE (mean squared error) or PSNR (peak signal to noise ratio), correspond to
the numerical analysis of pixel values before and after compression, these values are very general
and do not always reflect the quality of the reconstructed image. For an image I of size n × m
pixels, we define:
∑
=
∑
=
−
×
=
n
i
m
j
II
mn
MSE
1 1
2
)ˆ(
1
dBen
MSE
PSNR
2^
)1256(
10log10
−
=
(10)
Iˆ represents the compressed image.
The purpose of each transformation is to concentrate the information on few coefficients, for this
we are going to precede tests to reconstruct the image with a portion of the coefficients.
In this paper we propose algorithms for fingerprint images compression based on wavelets and
wave Atoms transform. First, we apply the different transforms on the original image in order to
obtain the energy maximization on a reduced number of coefficients; following the low
coefficients will be set to zero by a threshold. The image is reconstructed in this case only by the
(9)
276 Computer Science & Information Technology (CS & IT)
most significant coefficients, and calculates the PSNR for determining the quality of the
reconstructed image.
Tables 1 and 2 present a comparative study between different transformations, based on wavelets
transforms and wave atoms, and their effects on reducing the number of coefficients required for
image reconstruction.
Table 1. PSNR’s results with wavelets transforms
From the Tables 1 and 2 we note that the PSNR increases when the percentage of coefficients
selected for image reconstruction increase. This applies to all transformations, by varying the
threshold value. However, this increase differs from decomposition to another, and in the same
context, we see that it is not a large scale for wavelet-based transformations. While with the
transformation in wave atom, the PSNR is growing strongly and the values are higher compared
to other processing while the number of coefficients used for reconstruction is much less
important.
Table 2. PSNR’s results with wave atoms transforms
We conclude that the transformation wave Atoms can better focus the information useful for the
image reconstruction, on few coefficients, this give more importance to use the wave atoms
transform for the compression of fingerprints images.
4.2 Compression algorithms
In this section, we realized the several compression schemes based on transformations wavelets
and wave atoms.
All these methods are based on the same compression scheme: we start by the transformation,
after the quantization and finally coding. So the difference between these schemes lies in the
choice of the transformation and the strategy of quantification. For the quantization, we adopt the
uniform scalar quantization with dead zone for the WSQ algorithm compression, while for the
Computer Science & Information Technology (CS & IT) 277
compression algorithm based on wave atoms transform we chose non-uniform scalar
quantization, these quantization are followed by Huffman and RLE (Run length coding) coding.
Table 3. Comparative results between algorithms
Algorithms RATE
PSNR
(dB)
Visual
assessment
wavelets 6,17 31,20 Poor
WSQ 5,75 31,36 Poor
Wave
atoms
18.00 35. 04 Very good
Figure 3. (a) Original image (b) Compressed image with wave atoms algorithm, (c) Compressed image
with WSQ algorithm
As shown in the table 3 we can say that the wave atoms algorithm gives the best results PSNR
with high compression rate.
Figure 3 represents a sample fingerprint image compressed and reconstructed by wave atoms and
WSQ algorithms; we can see that wave atoms algorithm provides excellent results for the image
reconstruction.
To appreciate the compression results, we could apply minutiae detection. Figure 4 illustrates the
detected minutiae for original and decompressed images, we can notice that the wave atoms
prevue the local structures.
(a)
(c)
(b)
278 Computer Science & Information Technology (CS & IT)
Figure 4. Minutiae detection on original and compressed image by wave atoms
The obtained results show that wave atoms transform is more appropriate to fingerprints images
compression than wavelet transform
5. CONCLUSION
Compression of fingerprint images based on wave atoms provides better results, it can improved
the PSNR with high RATE compared to WSQ fingerprint standard compression, we have also
shown that wavelets are not all time appropriate to different type of images and on of them the
images with curvatures and lines.
ACKNOWLEDGEMENTS
Thank’s everyone
REFERENCES
[1] S. G. Mallat. “A Wavelet Tour of Signal Processing”. 2nd Edition,San Diego : Academic Press, 1999.
[2] Zehira Haddad, Azeddine Beghdadi, Amina Serir, Anissa Mokraoui, “A new fingerprint image
compression based on wave atoms transform”, IEEE Xplore, 2009.
[3] M.N. Do and M. Vetterli, “The finite ridgelet transform for image representation”, IEEE Trans Image
Processing, vol. 12, no 1, pp. 16-28, 2003.
[4] M.N. Do and M. Vetterli, “The contourlet transform: An efficient directional multiresolution image
representation”, IEEE Trans. Image Processing, vol. 14, no 12, pp. 2091-2106, 2005.
[5] E.J. Candès, L. Demanet, D.L. Donoho and L. Ying, “Fast discrete curvelet transforms”, Multiscale
Model. Simul., pp. 861-899, 2005.
[6] S. Mallat, “A wavelet Tour of Signal Processing”, Second Edition, Academic Press, Orlando-
SanDiego, 1999.
[7] J.P. Antoine and R. Murenzi, “Two-dimensional directional wavelets and the scale-angle
representation”, Sig. Process, vol. 52, pp. 259-281, 1996.
[8] L. Villemoes, “Wavelet packets with uniform time-frequency localization”, in Comptes Rendus Math,
vol. 335, no 10, pp. 793-796, 2002.
[9] L. Demanet and L. Ying, “Wave Atoms and Sparsity of Oscillatory Patterns”, Appl. Comput.
Harmon. Anal., vol. 23, no 3, pp. 368-387, 2007.
[10] L. Demanet and L. Ying, “Scattering in Flatland: Efficient Representations via Wave Atoms”, in
Found. of Comput. Math, 2008.
Original image Compressed image

More Related Content

What's hot

SECURE WATERMARKING TECHNIQUE FOR MEDICAL IMAGES WITH VISUAL EVALUATION
SECURE WATERMARKING TECHNIQUE FOR MEDICAL IMAGES WITH VISUAL EVALUATIONSECURE WATERMARKING TECHNIQUE FOR MEDICAL IMAGES WITH VISUAL EVALUATION
SECURE WATERMARKING TECHNIQUE FOR MEDICAL IMAGES WITH VISUAL EVALUATIONsipij
 
A Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression AlgorithmsA Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression AlgorithmsIJORCS
 
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...IDES Editor
 
1.differential approach to cardioid distribution -1-6
1.differential approach to cardioid distribution -1-61.differential approach to cardioid distribution -1-6
1.differential approach to cardioid distribution -1-6Alexander Decker
 
11.0001www.iiste.org call for paper.differential approach to cardioid distrib...
11.0001www.iiste.org call for paper.differential approach to cardioid distrib...11.0001www.iiste.org call for paper.differential approach to cardioid distrib...
11.0001www.iiste.org call for paper.differential approach to cardioid distrib...Alexander Decker
 
Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...TELKOMNIKA JOURNAL
 
An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...IDES Editor
 
A Novel and Robust Wavelet based Super Resolution Reconstruction of Low Resol...
A Novel and Robust Wavelet based Super Resolution Reconstruction of Low Resol...A Novel and Robust Wavelet based Super Resolution Reconstruction of Low Resol...
A Novel and Robust Wavelet based Super Resolution Reconstruction of Low Resol...CSCJournals
 
AN INVESTIGATION OF WATERMARKING MEDICAL IMAGES
AN INVESTIGATION OF WATERMARKING MEDICAL IMAGESAN INVESTIGATION OF WATERMARKING MEDICAL IMAGES
AN INVESTIGATION OF WATERMARKING MEDICAL IMAGEScscpconf
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcsandit
 
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...CSCJournals
 

What's hot (15)

SECURE WATERMARKING TECHNIQUE FOR MEDICAL IMAGES WITH VISUAL EVALUATION
SECURE WATERMARKING TECHNIQUE FOR MEDICAL IMAGES WITH VISUAL EVALUATIONSECURE WATERMARKING TECHNIQUE FOR MEDICAL IMAGES WITH VISUAL EVALUATION
SECURE WATERMARKING TECHNIQUE FOR MEDICAL IMAGES WITH VISUAL EVALUATION
 
A Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression AlgorithmsA Comparative Study of Image Compression Algorithms
A Comparative Study of Image Compression Algorithms
 
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
 
1.differential approach to cardioid distribution -1-6
1.differential approach to cardioid distribution -1-61.differential approach to cardioid distribution -1-6
1.differential approach to cardioid distribution -1-6
 
11.0001www.iiste.org call for paper.differential approach to cardioid distrib...
11.0001www.iiste.org call for paper.differential approach to cardioid distrib...11.0001www.iiste.org call for paper.differential approach to cardioid distrib...
11.0001www.iiste.org call for paper.differential approach to cardioid distrib...
 
Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...
 
An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...An Application of Second Generation Wavelets for Image Denoising using Dual T...
An Application of Second Generation Wavelets for Image Denoising using Dual T...
 
Cb34474478
Cb34474478Cb34474478
Cb34474478
 
A Novel and Robust Wavelet based Super Resolution Reconstruction of Low Resol...
A Novel and Robust Wavelet based Super Resolution Reconstruction of Low Resol...A Novel and Robust Wavelet based Super Resolution Reconstruction of Low Resol...
A Novel and Robust Wavelet based Super Resolution Reconstruction of Low Resol...
 
Cc24529533
Cc24529533Cc24529533
Cc24529533
 
Bh044365368
Bh044365368Bh044365368
Bh044365368
 
AN INVESTIGATION OF WATERMARKING MEDICAL IMAGES
AN INVESTIGATION OF WATERMARKING MEDICAL IMAGESAN INVESTIGATION OF WATERMARKING MEDICAL IMAGES
AN INVESTIGATION OF WATERMARKING MEDICAL IMAGES
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
 
Ls2520342037
Ls2520342037Ls2520342037
Ls2520342037
 

Similar to FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS

FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMScsandit
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...ijistjournal
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...ijistjournal
 
A Comparative Study of Wavelet and Curvelet Transform for Image Denoising
A Comparative Study of Wavelet and Curvelet Transform for Image DenoisingA Comparative Study of Wavelet and Curvelet Transform for Image Denoising
A Comparative Study of Wavelet and Curvelet Transform for Image DenoisingIOSR Journals
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKScscpconf
 
REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...
REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...
REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...cscpconf
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Medical image fusion using curvelet transform 2-3-4-5
Medical image fusion using curvelet transform 2-3-4-5Medical image fusion using curvelet transform 2-3-4-5
Medical image fusion using curvelet transform 2-3-4-5IAEME Publication
 
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...IJECEIAES
 
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
 
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...sipij
 
4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curvelet4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curveletAlexander Decker
 
4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curvelet4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curveletAlexander Decker
 
Paper id 2420148
Paper id 2420148Paper id 2420148
Paper id 2420148IJRAT
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESijcnac
 

Similar to FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS (20)

FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
 
B042107012
B042107012B042107012
B042107012
 
A Comparative Study of Wavelet and Curvelet Transform for Image Denoising
A Comparative Study of Wavelet and Curvelet Transform for Image DenoisingA Comparative Study of Wavelet and Curvelet Transform for Image Denoising
A Comparative Study of Wavelet and Curvelet Transform for Image Denoising
 
Me2521122119
Me2521122119Me2521122119
Me2521122119
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
 
REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...
REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...
REVERSIBLE WAVELET AND SPECTRAL TRANSFORMS FOR LOSSLESS COMPRESSION OF COLOR ...
 
R044120124
R044120124R044120124
R044120124
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Medical image fusion using curvelet transform 2-3-4-5
Medical image fusion using curvelet transform 2-3-4-5Medical image fusion using curvelet transform 2-3-4-5
Medical image fusion using curvelet transform 2-3-4-5
 
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
 
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN
 
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
 
4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curvelet4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curvelet
 
4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curvelet4.[23 28]image denoising using digital image curvelet
4.[23 28]image denoising using digital image curvelet
 
Paper id 2420148
Paper id 2420148Paper id 2420148
Paper id 2420148
 
Dk33669673
Dk33669673Dk33669673
Dk33669673
 
Gx3612421246
Gx3612421246Gx3612421246
Gx3612421246
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS

  • 1. David C. Wyld et al. (Eds) : CST, ITCS, JSE, SIP, ARIA, DMS - 2014 pp. 271–278, 2014. © CS & IT-CSCP 2014 DOI : 10.5121/csit.2014.4125 FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS Mustapha Delassi and Amina Serir. LTIR, Faculté d'électronique et d'informatique, USTHB BP 32 EI Alia, bab ezzouar, 16111 Alger, Algerie ABSTRACT The fingerprint images compression based on geometric transformed presents important research topic, these last year’s many transforms have been proposed to give the best representation to a particular type of image “fingerprint image”, like classics wavelets and wave atoms. In this paper we shall present a comparative study between this transforms, in order to use them in compression. The results show that for fingerprint images, the wave atom offers better performance than the current transform based compression standard. The wave atoms transformation brings a considerable contribution on the compression of fingerprints images by achieving high values of ratios compression and PSNR, with a reduced number of coefficients. In addition, the proposed method is verified with objective and subjective testing. KEYWORDS Image, compression, fingerprint, wavelets, wave atoms, WSQ. 1. INTRODUCTION The fundamental goal of image compression is to obtain the best possible image quality at an allocated storage capacity. For this, data compression is one of the major challenges that are used in the majority of digital applications and specifically in the field of biometric "fingerprint", which presents the centre of interest in our work. The overall process of image compression through a series of steps: transformation, quantization and coding. The diversity at the steps led to the birth of different compression standards according to the desired application. In image compression, it is important to get the ability of representing in a very simple way the data or the information with the minimum possible elements with allowing a loss of information, for this, the transformation has duel contribution, it decorrelates the image components and allows identifying the redundancy. Second it offers a high level of compactness of the energy in the spatial frequency domain. There have been several transforms used in data compression, Discrete Fourier Transform (DFT) and the DCT (Discrete cosines transform), DWT (Discrete wavelets transform) for images compression. Wavelets have been widely used in image processing, such as denoising and image compression [1]. The success of wavelets with the JPEG2000 standard, and the DCT with the JPEG standard was great, but its performance is limited to a certain type of images, this is why some other standard dedicated to compression of fingerprint images are appeared, one of them is, the FBI
  • 2. 272 Computer Science & Information Technology (CS & IT) fingerprint image compression standard, the wavelet scalar quantization (WSQ), which is based on optimized decomposition of wavelet. In our work we propose an algorithm for fingerprint image compression using wave atoms decomposition, compared with WSQ standard results, in order to justify the contribution that can bring wave atoms transformation for fingerprint image compression. The remainder of this paper is divided into 4 sections. Section 2 discusses the wavelets and WSQ standard, wave atoms transform implementation details and the proposed method for fingerprint image compression is described in section 3. Experimental results are discussed in section 4 and section 5 details concluding remarks followed by acknowledgment and references. 2. WSQ STANDARD In 1993, the FBI (Federal Bureau of Investigation) has developed a standard for compressing fingerprint images and reconstruction based on wavelet transforms, the fingerprint image is decomposed using 2D DWT, the wavelets used are the biorthogonal 9/7 discrete wavelet transform (DWT), by decomposing the image into four sub-bands of lower size in every level. The structure of the tree decomposition can be determined by applying different tests on several reference images. The tests concluded that the best tree consists of 64 sub bands [2]. These sub- bands are further decomposed in to sets which grouped the same levels of decomposition, then quantized and coded. The quantization used for each sub-bands is, the uniform scalar quantization with dead zone, and then encoded using Huffman algorithm and RLE (Run Length Encoding). The WSQ compression technique can compress fingerprint images with compression ratio ranging from 10 to 1 and 20 to 1 [2]. However, despite that the wavelet transform is effective for the detection of isotropic structures; it’s not optimal for the analysis of anisotropic objects in the image (i.e., lines, contours), because they fail to follow the direction of this edge. To this effect, new multiscale geometric transforms so-called second generation have been developed, such as ridgelets [3], contourlets [4], curvelets [5], and more recently proposed, the wave atoms, which all incorporate the notion of directionality. 3. WAVE ATOMS Wave atoms are a recent addition to the collection of mathematical transforms for harmonic computational analysis. Wave atoms are a variant of wavelet packets, they have a high frequency localization that cannot be achieved using a filter bank based on wavelet packets and curvelet Gabor atoms. Wave atoms precisely interpolate between Gabor atoms [6] (constant support) and directional wavelets [7] (wavelength ~ diameter) in the sense that the period of oscillations of each wave packet (wavelength) is related to the size of essential support by the parabolic scaling i.e. wavelength ~ (diameter)2. Different transforms based on wavelet packet, need to be represented as 'phase-space tiling', there are two different parameters α, which represent whether the multi-scale decomposition is , and β- directional capacity if it is isotropic, Wavelets (including Multi Resolution Analysis [5], directional [8] and complex [9]) correspond to α = 1 β = 1, for ridgelets [10] α = 1, β = 0, Gabor transform α = 1, β = 0 and curvelets [3] correspond to α = 1, β = 1/2. Wave atoms are defined for α = 1, β = 1/2. Figure 1 illustrates this classification [4].
  • 3. Computer Science & Information Technology (CS & IT) 273 Figure 1. Diagram of (α ,β) [Hadd 2009] 3.1 1D discrete wave atoms Wave atoms are tensor products of a special type of 1D wave packets. )(, x j nmψ is a one- dimensional family of real-valued wave packets, where 0,0 ≥≥ mj and Ζ∈n , cantered in frequency around ± ωj,m=2π Jm, with j Cm j C 2221 ≤≤ ,and centred in space around xj,n=2-jn. One- dimensional version of the parabolic scaling states that the support of )(,ˆ ωψ j nm is of length O(2j) while ωj,m= O(22j). Filter bank-based wavelet packets is considered as a potential definition of an orthonormal basis satisfying these localization properties. The wavelet packet tree, defining the partitioning of the frequency axis in 1D, can be chosen to have depth j when the frequency is 22j. However, there is a problem associated with standard wavelet packets, that the direction in which they meet the frequency localization is rather weak [9]. Dyadic dilates and translates of 0 ˆmω on the frequency axes are combined and bases function, written as: )2( 022)2()(, nx j m j n j x j mx j nm −= − −= ψψψ (1) The coefficients cj,m,n, for each wave number ωj,m,n, are obtained as a decimated convolution at scale 2-j. dxxun j x j mnmjc ∫ − −= )()2(,, ψ (2) By Plancherel’s theorem, ωωωψ du j m ji enmjc ∫ ∧∧− = )()( 2 ,, (3) Assuming that the function u is accurately discretized xk = kh, h=1/N, k =1....N, then up to some small truncation error:
  • 4. 274 Computer Science & Information Technology (CS & IT) ∑ + −= ∧∧− = )2:1:12(2 )()( 2 ,, NNk kuk j m ji e D nmjc π ψ (4) This equation makes sense for couples (j,m) for which the support of )(ˆ kj mψ lies entirely inside the interval [-πn,πn], so we may write k ∈ 2πZ. 3.2.2 D discrete wave atoms A two-dimensional orthonormal basis function with 4 bumps in frequency plane is formed by individually taking products of 1D wave packets. Mathematical formulation and implementations for 1D case are detailed in the previous section. 2D wave atoms are indexed by µ=(j,m,n), where m=(m1,m2) and n=(n1,n2). Construction is not a simple tensor product since there is only one scale subscript j. This is similar to the non-standard or multiresolution analysis wavelet bases where the point is to enforce same scale in both directions in order to retain an isotropic aspect ratio. Eq. (1) is modified in 2D as: )222( 2 )121( 1 )2,1( n j x j mn j x j mxxµ − − − −= + ψψϕ (5) The Fourier transform is also separable, namely: 222 )1( 2 ˆ112 )1( 1 ˆ)2,1(ˆ ω ωψ ω ωψωωϕ nji e j m nji e j mµ −− = + (6) )222( 2 )121( 1 )2,1( n j x j mHn j x j mHxxµ − − − −= − ψψϕ (7) The recombination between the relations (6) and (7), by dual orthonormal basis give: 2 )2( , 2 )1( − − + = − + + = µµ µ µµ µ ϕϕ ϕ ϕϕ ϕ (8) provides basis functions with two bumps in the frequency plane, symmetric with respect to the origin, hence directional wave packets (oscillating in one single direction). Together, , )2()1( µandµ ϕϕ form the wave atom frame and may be denoted jointly as µϕ . The price to pay in considering both , )2()1( µandµ ϕϕ is an increase of a factor 2 in the redundancy. Wave atom algorithm is based on the apparent generalization of the 1D wrapping strategy to two dimensions and its complexity is O (N2 Log N). Figure 2 represents the wave atom tiling of the special frequency plane. The size of the squares doubles when the scale j increases by 1. At a given scale j, squares are indexed by m1, m2 starting from zero near the axes.
  • 5. Computer Science & Information Technology (CS & IT) 275 Figure 2. wave atom tiling of the frequency plane 4. RESULUTS AND DISCUTION 4.1 Transforms studies Several fingerprint images compression standards was used in order to reduce their size, quoting JPEG with CDT transforms, WSQ, and JPEG 2000 with DWT transforms, wavelet transform has brought a significant contribution, but for the feature of the fingerprint images, these transformations have not given a good compression results, for this, other transforms was used to better characterize the fingerprints images. Measures such as MSE (mean squared error) or PSNR (peak signal to noise ratio), correspond to the numerical analysis of pixel values before and after compression, these values are very general and do not always reflect the quality of the reconstructed image. For an image I of size n × m pixels, we define: ∑ = ∑ = − × = n i m j II mn MSE 1 1 2 )ˆ( 1 dBen MSE PSNR 2^ )1256( 10log10 − = (10) Iˆ represents the compressed image. The purpose of each transformation is to concentrate the information on few coefficients, for this we are going to precede tests to reconstruct the image with a portion of the coefficients. In this paper we propose algorithms for fingerprint images compression based on wavelets and wave Atoms transform. First, we apply the different transforms on the original image in order to obtain the energy maximization on a reduced number of coefficients; following the low coefficients will be set to zero by a threshold. The image is reconstructed in this case only by the (9)
  • 6. 276 Computer Science & Information Technology (CS & IT) most significant coefficients, and calculates the PSNR for determining the quality of the reconstructed image. Tables 1 and 2 present a comparative study between different transformations, based on wavelets transforms and wave atoms, and their effects on reducing the number of coefficients required for image reconstruction. Table 1. PSNR’s results with wavelets transforms From the Tables 1 and 2 we note that the PSNR increases when the percentage of coefficients selected for image reconstruction increase. This applies to all transformations, by varying the threshold value. However, this increase differs from decomposition to another, and in the same context, we see that it is not a large scale for wavelet-based transformations. While with the transformation in wave atom, the PSNR is growing strongly and the values are higher compared to other processing while the number of coefficients used for reconstruction is much less important. Table 2. PSNR’s results with wave atoms transforms We conclude that the transformation wave Atoms can better focus the information useful for the image reconstruction, on few coefficients, this give more importance to use the wave atoms transform for the compression of fingerprints images. 4.2 Compression algorithms In this section, we realized the several compression schemes based on transformations wavelets and wave atoms. All these methods are based on the same compression scheme: we start by the transformation, after the quantization and finally coding. So the difference between these schemes lies in the choice of the transformation and the strategy of quantification. For the quantization, we adopt the uniform scalar quantization with dead zone for the WSQ algorithm compression, while for the
  • 7. Computer Science & Information Technology (CS & IT) 277 compression algorithm based on wave atoms transform we chose non-uniform scalar quantization, these quantization are followed by Huffman and RLE (Run length coding) coding. Table 3. Comparative results between algorithms Algorithms RATE PSNR (dB) Visual assessment wavelets 6,17 31,20 Poor WSQ 5,75 31,36 Poor Wave atoms 18.00 35. 04 Very good Figure 3. (a) Original image (b) Compressed image with wave atoms algorithm, (c) Compressed image with WSQ algorithm As shown in the table 3 we can say that the wave atoms algorithm gives the best results PSNR with high compression rate. Figure 3 represents a sample fingerprint image compressed and reconstructed by wave atoms and WSQ algorithms; we can see that wave atoms algorithm provides excellent results for the image reconstruction. To appreciate the compression results, we could apply minutiae detection. Figure 4 illustrates the detected minutiae for original and decompressed images, we can notice that the wave atoms prevue the local structures. (a) (c) (b)
  • 8. 278 Computer Science & Information Technology (CS & IT) Figure 4. Minutiae detection on original and compressed image by wave atoms The obtained results show that wave atoms transform is more appropriate to fingerprints images compression than wavelet transform 5. CONCLUSION Compression of fingerprint images based on wave atoms provides better results, it can improved the PSNR with high RATE compared to WSQ fingerprint standard compression, we have also shown that wavelets are not all time appropriate to different type of images and on of them the images with curvatures and lines. ACKNOWLEDGEMENTS Thank’s everyone REFERENCES [1] S. G. Mallat. “A Wavelet Tour of Signal Processing”. 2nd Edition,San Diego : Academic Press, 1999. [2] Zehira Haddad, Azeddine Beghdadi, Amina Serir, Anissa Mokraoui, “A new fingerprint image compression based on wave atoms transform”, IEEE Xplore, 2009. [3] M.N. Do and M. Vetterli, “The finite ridgelet transform for image representation”, IEEE Trans Image Processing, vol. 12, no 1, pp. 16-28, 2003. [4] M.N. Do and M. Vetterli, “The contourlet transform: An efficient directional multiresolution image representation”, IEEE Trans. Image Processing, vol. 14, no 12, pp. 2091-2106, 2005. [5] E.J. Candès, L. Demanet, D.L. Donoho and L. Ying, “Fast discrete curvelet transforms”, Multiscale Model. Simul., pp. 861-899, 2005. [6] S. Mallat, “A wavelet Tour of Signal Processing”, Second Edition, Academic Press, Orlando- SanDiego, 1999. [7] J.P. Antoine and R. Murenzi, “Two-dimensional directional wavelets and the scale-angle representation”, Sig. Process, vol. 52, pp. 259-281, 1996. [8] L. Villemoes, “Wavelet packets with uniform time-frequency localization”, in Comptes Rendus Math, vol. 335, no 10, pp. 793-796, 2002. [9] L. Demanet and L. Ying, “Wave Atoms and Sparsity of Oscillatory Patterns”, Appl. Comput. Harmon. Anal., vol. 23, no 3, pp. 368-387, 2007. [10] L. Demanet and L. Ying, “Scattering in Flatland: Efficient Representations via Wave Atoms”, in Found. of Comput. Math, 2008. Original image Compressed image