SlideShare a Scribd company logo
1 of 5
Download to read offline
Ramandeep Kaur Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 3), August 2014, pp.56-60 
www.ijera.com 56 | P a g e 
Comparative Analysis of Lossless Image Compression Based On Row By Row Classifier and Various Encoding Schemes on Color Images Ramandeep Kaur, Dr. Sukhjeet K. Ranade M.Tech (CSE), Department of Computer Science, Punjabi University, Patiala. Assistant Professor, Department of Computer Science, Punjabi University, Patiala. ABSTRACT 
Lossless image compression is needed in many fields like medical imaging, telemetry, geophysics, remote sensing and other applications, which require exact replica of original image and loss of information is not tolerable. In this paper, a near lossless image compression algorithm based on row by row classifier with encoding schemes like Lempel Ziv Welch (LZW), Huffman and Run Length Encoding (RLE) on color images is proposed. The algorithm divides the image into three parts R, G and B, apply row by row classification on each part and result of this classification is records in the mask image. After classification the image data is decomposed into two sequences each for R, G and B and mask image is hidden in them. These sequences are encoded using different encoding schemes like LZW, Huffman and RLE. An exhaustive comparative analysis is performed to evaluate these techniques, which reveals that the proposed algorithm have smaller bits per pixel (bpp) than simple LZW, Huffman and RLE encoding techniques. 
I. INTRODUCTION 
In today era of computer industry, the major challenges are to minimize the time of transmission data over network and reduce the storage space. Transmission time can be reduced significantly by reducing the size of data files. A data file can be text, graphic images, audio, video or algorithms. Reducing the size of data files also minimize the storage capacity or space requirement on the computer. In many fields like medical imaging, remote sensing, military affairs and scientific research, both low storage consumption and high image quality is required. Therefore lossless and near lossless compression methods are strongly needed. Bit-plane encoding, Run Length Encoding (RLE), Huffman, Lempel Ziv Welch (LZW), arithmetic encoding and lossless predictive encoding are all popular lossless compression methods [1].Data compression is the technique to reduce the size of data files by reducing redundancy, which helps to decrease data storage requirements and hence minimize time and communication cost [2]. It can also be defined as the method of encoding rules that allow substantial reduction in the total number of bits to store or transmit a file [3]. Image compression is the application of data compression on digital image. Image compression is the technique to reduce redundant and irrelevant image data in order to store or transmit data over network in very efficient form. Image compression can be of two types, lossless image compression and lossy image compression. If the process of redundancy removing is reversible i.e. 
the exact reconstruction of the original image can be achieved then it is known as lossless image compression [4]. Lossless image compression methods used in applications like medical imaging, scientific images, satellite imaging, artificial images remote sensing and forensic analysis. On the other side lossy compression methods are used in web browsing, photography, image editing and printing [4-6]. In lossy compression there is a problem of compression artifacts, because it works on low bit rate. Yang and Bourbakis presented a paper to discuss the comparison of various lossless compression schemes depending upon their performance. Lossless image compression can always be modeled as a two stage procedure first one is décor-relation and second is entropy coding [4]. A new compression scheme based on sub block interchange (SBI) was proposed by Ng and Cheng [7]. When this scheme is compared with Burrows and Wheeler Transformation (BWT) [8], SBI gains a little bit improvement in the compresses ratio but have a greater improvement in the compression speed. BWT takes much longer time for compression than GIF because input data requires a sorting procedure based on quick sort algorithm [8]. Triantafyllidis and Strintzis presented a technique for the implementation of context based adaptive arithmetic entropy coding. A drawback of arithmetic coding of images using the above adaptive model is that it does not take into account the high amount of correlation between adjacent pixels [9]. Yao-hua et al. presented a paper in which a near-lossless image compression algorithm using classification, 
RESEARCH ARTICLE OPEN ACCESS
Ramandeep Kaur Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 3), August 2014, pp.56-60 
www.ijera.com 57 | P a g e 
information hiding and LZW is proposed. The 
algorithm takes advantage of the effects of the 
distribution of pixels on compression ratio. In the 
proposed algorithm, pixels of an image are classified 
row by row; pixels similar in value are gathered and 
the classification result is recorded in a mask image 
[1].In this paper lossless compression algorithm on 
color images having 24 bits per pixel (bpp) value is 
proposed using row by row classifier and different 
popular encoding schemes like LZW, Huffman and 
RLE. The proposed algorithm is a preprocessing 
stage followed by different encoding schemes which 
helps to reduce the size of image more than that of 
simple encoding schemes. 
II. THE PROPOSED ALGORITHM 
The proposed algorithm is mainly data re-ordering 
process before applying the compression 
technique. To achieve better compression from a 
compression technique, input data may be processed 
in such a manner that correlation among the elements 
of the data can be increased. Here pixels of an image 
taken row by row are placed in two groups based on a 
threshold value. So that pixels having similar values 
fall in a same group. That is more correlation can 
achieve in the values of pixels. The proposed 
algorithm consists of 4 steps which are shown in Fig. 
1. These steps are discussed in following subsections. 
2.1 Classification row by row 
In this step classification will be performed Row 
by row based on determining the threshold by using 
histogram of each row. Classification is done to put 
pixels in classes and pixels in same class must have 
similar value. Here classes will be divided according 
to the threshold calculated using histogram of each 
row. The number of classes will be six, two for each 
Red ( Clr1 ,Clr2 ), Green (Cl g1 , 2 Cl g ) and Blue 
( 1 Clb , 2 Clb ).After calculating threshold for each 
row, the pixels of each part (R, G and B) can be 
classified using below method: 
For Red part 
1 
2 
( , ) , 
( , ) , 
Ir i j Clr 
Ir i j Clr 
  
  
( , ) ( ) 
( , ) ( ) 
Ir i j thr i 
Ir i j thr i 
 
 
Similarly we can classify Green and Blue parts. Ir 
represents Red part of original image, similarly Ib 
and Ig can be used for Blue and Green part. thr (i) 
represents threshold of each row of Red part, 
similarly thg(i) and thb(i) can be used for Green and 
Blue part. 
i and j represents rows and column respectively and i, 
j = 0, 1, 2……………..S-1. ( 1 Clr , 1 Cl g and 1 Clb ) 
and ( 2 Clr , 2 Cl g and 2 Clb ) represents classes 
belongs to great pixel value and small pixel value. 
Using threshold calculated above, a mask image Mr, 
Mg and Mb for red, green and blue part respectively 
can be formed of size S S by allotting 0 and 1 for 
each pixel value as given below. 
Mask image for Red Part is 
( , ) 1, 
( , ) 0, 
Mr i j 
Mr i j 
  
  
( , ) ( ) 
( , ) ( ) 
Ir i j thr i 
Ir i j thr i 
 
 
Similarly we can generate mask images Mg and 
Mb for Green and Blue part respectively. Mr, Mg and 
Mb contain the information of classification results. 
2.2 Decomposition of image data 
After the classification of pixels, Original image 
is divided into six sequences, two for each Red, 
Green and Blue part and each sequence contains 
pixels of one class. 
Here the need to arrange the pixels of R,G and B 
part of image along the scan line by study row by row 
as given below :
Ramandeep Kaur Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 3), August 2014, pp.56-60 
www.ijera.com 58 | P a g e 
Dr={Ir (0, 0), Ir (0, 1), Ir (0, 2)…………..Ir (0, S-1) 
……………………………………………………… 
Ir (S-1, 0), Ir (S-1, 1)…………..……..Ir (S-1, S-1)} 
Similarly we can decompose Green (Dg) and Blue 
(Db) part of Image. 
Red part will be decomposed into two sequences 1 dr 
and 2 dr based on threshold calculating in step first, 
method performed is given below. 
1 
2 
( , ) , 
( , ) , 
Ir i j dr 
Ir i j dr 
  
  
( , ) ( ) 
( , ) ( ) 
Ir i j thr i 
Ir i j thr i 
 
 
or 
or 
( , ) 1 
( , ) 0 
Mr i j 
Mr i j 
 
 
Similarly we can calculate above for Green and Blue 
part. Where ( 1 dr , 2 dr ), ( 1 dg , 2 dg ), and ( 1 db , 2 db ) 
represents subsequences for Dr, Dg and Db 
respectively and contains the pixels with great pixel 
value and small pixel value. 
2.3 Hiding the mask image 
Before hiding the mask image, the six 
decomposed sequences are combined into two 
sequences d1 and d2 depending upon their value 
calculated during decomposition. 
d1 = [ 1 dr 1 dg 1 db ] and d2 = [ 2 dr 2 dg 2 db ] 
For decoding process mask images Mr, Mg and 
Mb will be required and these mask images required 
extra storage space. To reduce this mask images will 
be hide in least significant bit (LSB) of d1 and d2. 
We need to arrange the mask images Mr, Mg and Mb 
according to scan line so that we can provide the 
exact value to LSB of exact pixel of the sequences d1 
and d2. 
Now we will arrange the pixels of Mr, Mg and 
Mb along the scan line, we get a sequence of binary 
value Br, Bg and Bb as given below: 
Br= {Mr (0, 0), Mr (0, 1), Mr (0, 2)…….Mr (0, S-1) 
………………………………………………………. 
Mr (S-1, 1), Mr (S-1, 2)……………..Mr (S-1, S-1)} 
And this approach will be similar to Bg and Bb. Now 
we hide the first element for Br i.e. Mr (0, 0) into 
LSB of first element of d1, then the second element 
Mr (0, 1) into second element of d1 and the process 
will be followed accordingly. When all the elements 
of d1 are used then elements of d2 will be used to 
hide the rest elements of mask image. 
To hide the mask image, we check the LSB of each 
element of d1 and d2. If the LSB of element or 
unassigned byte variable is 1, then we perform the 
“OR” operation with binary value of the element with 
1 otherwise perform “AND” with 254. 
&254, 
|1, 
El 
El 
El 
 
 
if 
if 
( ) 0 
( ) 1 
LSB El 
LSB El 
 
 
And after performing this operation, result will 
be stored in two new sequences S1 and S2 as shown 
in Fig. 1. 
2.4 Encoding and decoding using LZW, Huffman 
and RLE and getting LSB from sequences 
Now these two sequences S1 and S2 will be 
encoded and decoded using LZW, Huffman and 
RLE. LZW is an error free compression approach and 
helps to remove spatial redundancy present in an 
image [4]. LZW assigns fixed length code word to 
variable length sequence of source symbols; it does 
not require prior knowledge of the probability of the 
occurrence of the symbols to be encoded. LZW is a 
dictionary based compression algorithm. This 
compression algorithm is used in many imaging file 
format GIF, TIFF and PDF [1]. 
Huffman coding is entropy coding algorithm and 
is used for lossless data compression. It is a form of 
statistical coding applicable to many form of data 
transmission like text file, program files 
Run length encoding is a very simple form of 
data compression in which runs of data (that is, 
sequences in which the same data value occurs in 
many consecutive data elements) are stored as a 
single data value rather than as the original run. This 
is most useful on data that contains many such runs 
for example, simple graphic images such as icons, 
line drawings, and animations. Run-length encoding 
performs lossless data compression and is well suited 
to palette-based bitmapped images such as computer 
icons. It does not work well at all on continuous-tone 
images such as photographs, although JPEG uses it 
quite effectively on the coefficients that remain after 
transforming and quantizing image blocks. It is also 
used in fax machines. 
After the decoding process we will get LSB from 
sequences S1 and S2 and mask images Mr, Mg and 
Mb will be extracted accordingly. After applying all 
the above step in reverse process the original image 
will be reconstructed. 
III. EXPERIMENTAL RESULT AND 
COMPARATIVE ANALYSIS 
The above algorithm is performed on color images of 
size S S having 24bpp value using “Matlab” 
version 7.14.0.739. Some of the popular test images 
used are “Airplane”, “Baboon”, “Barbara”, “House”, 
“Leena”, “Livingroom”, “Pepper”, and “Tree”. From 
original image R, G and B part extracted first and 
then row by row classification and decomposition is 
performed which is followed by different encoding 
and decoding schemes. Fig. 2 shows the original 
image of “Leena” its mask images and reconstructed 
image.
Ramandeep Kaur Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 3), August 2014, pp.56-60 
www.ijera.com 59 | P a g e 
Fig. 2. Original Image, Mask Image (R, G and B) and Reconstructed Image (a) (b) (c) (d) 
(e) (f) (g) (h) (a)Airplane; (b) Baboon; (c) Barbara; (d) House; (e) Leena; (f) Livingroom; (g) Peppers; (h) Tree; Fig. 3. The Popular Test Images The bpp value of the test images using the proposed algorithm with different encoding schemes can be analyzed through graph as shown in Fig. 4. Average bpp value calculated using simple RLE is 20.36625 and using the proposed algorithm with RLE is 16.88 and in LZW it is 23.4975 and 20.31375 and in case of Huffman the value is 22.14 and 19.42625.From this we conclude that the image has smaller bpp value when compressed through the proposed algorithm. During comparative analysis between different encoding schemes using algorithm, the results shows that RLE have smaller bpp value as compared to LZW and Huffman. During the process of mask image hiding there is a possibility of change of LSBs, due to which there will be a noise in reconstructed image. However PSNR value of test images shows that there is very significant change in the quality of reconstructed images. It is very difficult to notice from naked eyes any difference between original image and reconstructed image. Table 1. shows PSNR values of test images
Ramandeep Kaur Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 8( Version 3), August 2014, pp.56-60 
www.ijera.com 60 | P a g e 
Fig. 4. The bpp Comparison of Image Using Different Methods Table 1. PSNR of Test Images 
IV. CONCLUSION AND FUTURE WORK 
A near lossless compression algorithm using row by row classification, mask image hiding, decomposition and different encoding schemes like LZW,RLE and Huffman is proposed on color images. Using Above algorithm smaller bpp value is obtained as compared to simple LZW, RLE and Huffman encoding. During comparative analysis between these encoding schemes using discussed algorithm we concluded that RLE have smaller bpp value as compared to other encoding schemes. In future task, other encoding schemes other than above discussed encoding techniques can be used on this correlation based algorithm to reduce the size of compressed image. REFERENCES [1] X. Yao-hua, T. Xiao-an and S. Mao-yin, “Image compression based on classification row by row and LZW encoding”. Congress on image and signal processing, 2008, pp. 617-621. 
[2] N.Ranganathan, S.G.Romaniuk and K.R. Namuduri, “A lossless image compression algorithm using variable blocks size segmentation”. IEEE Transactions on Image Processing, Vol. 4, No. 10, pp. 1396-1406, 1995. 
[3] M.-B. Lin, J.-F. Lee and G.E. Jan, “A lossless data compression and decompression algorithm and its hardware architecture”. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 14, No. 9, pp. 925-936, 2006. 
[4] M.Yang and N.Bourbakis, “An overview of lossless digital image compression techniques”. 48th Midwest Symposium on Circuits and Systems, 2005, pp. 1099-1102. 
[5] K. Sayood and K. Anderson, “A differential lossless image compression scheme”, IEEE Transactions on Signal Processing, Vol.40, No.1, pp. 236-241, 1992. 
[6] S.A. Hassan and M. Hussain, “Spatial domain lossless image data compression method”. International conference on information and communication technologies (ICICT), 2011, pp. 1-4. 
[7] K.S. Ng and L.M Cheng, “SUB-BLOCK interchange for lossless image compression”. IEEE Transactions on Consumer Electronics, Vol.45, No.1, pp. 236-241, 1999. [8] M. Burrows and D.J.Wheeler, “A Block- sorting lossless data compression algorithm”, SRC Research report 124, Digital Systems Research Center, Palo, Alto, 1994. 
[9] G.A. Triantafyllidis and M.G. Strintzis, “A Context based adaptive Arithmetic coding technique for lossless image compression”. Signal Processing Letters IEEE, Vol.6, No.7, pp. 168-170, 1999.

More Related Content

What's hot

Modified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image CompressionModified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image Compressionidescitation
 
Reversible Data Hiding Using Contrast Enhancement Approach
Reversible Data Hiding Using Contrast Enhancement ApproachReversible Data Hiding Using Contrast Enhancement Approach
Reversible Data Hiding Using Contrast Enhancement ApproachCSCJournals
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniquesIRJET Journal
 
Reversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancementReversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancementredpel dot com
 
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...AM Publications,India
 
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...IJERA Editor
 
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...Alexander Decker
 
IRJET- Satellite Image Resolution Enhancement
IRJET- Satellite Image Resolution EnhancementIRJET- Satellite Image Resolution Enhancement
IRJET- Satellite Image Resolution EnhancementIRJET Journal
 
Review of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image CompressionReview of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image CompressionIRJET Journal
 
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd Iaetsd
 
Improved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imagesImproved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imageseSAT Journals
 
A Study of Image Compression Methods
A Study of Image Compression MethodsA Study of Image Compression Methods
A Study of Image Compression MethodsIOSR Journals
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...ijait
 
Information search using text and image query
Information search using text and image queryInformation search using text and image query
Information search using text and image queryeSAT Journals
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...IAEME Publication
 

What's hot (20)

Modified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image CompressionModified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image Compression
 
20120140504016
2012014050401620120140504016
20120140504016
 
Reversible Data Hiding Using Contrast Enhancement Approach
Reversible Data Hiding Using Contrast Enhancement ApproachReversible Data Hiding Using Contrast Enhancement Approach
Reversible Data Hiding Using Contrast Enhancement Approach
 
B070306010
B070306010B070306010
B070306010
 
Ad04603175180
Ad04603175180Ad04603175180
Ad04603175180
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
337
337337
337
 
Reversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancementReversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancement
 
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
 
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
 
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
 
IRJET- Satellite Image Resolution Enhancement
IRJET- Satellite Image Resolution EnhancementIRJET- Satellite Image Resolution Enhancement
IRJET- Satellite Image Resolution Enhancement
 
Review of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image CompressionReview of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image Compression
 
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing in
 
Improved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imagesImproved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document images
 
A Study of Image Compression Methods
A Study of Image Compression MethodsA Study of Image Compression Methods
A Study of Image Compression Methods
 
Ijetcas14 372
Ijetcas14 372Ijetcas14 372
Ijetcas14 372
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
Information search using text and image query
Information search using text and image queryInformation search using text and image query
Information search using text and image query
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...
 

Viewers also liked

Implementation for Controller to Unified Single Phase Power Flow Using Digita...
Implementation for Controller to Unified Single Phase Power Flow Using Digita...Implementation for Controller to Unified Single Phase Power Flow Using Digita...
Implementation for Controller to Unified Single Phase Power Flow Using Digita...IJERA Editor
 
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...IJERA Editor
 
Design of Automated Rotory Cage Type Fixture for Cylinder Block
Design of Automated Rotory Cage Type Fixture for Cylinder BlockDesign of Automated Rotory Cage Type Fixture for Cylinder Block
Design of Automated Rotory Cage Type Fixture for Cylinder BlockIJERA Editor
 
Future Internet: Challenge And Research Trend
Future Internet: Challenge And Research TrendFuture Internet: Challenge And Research Trend
Future Internet: Challenge And Research TrendIJERA Editor
 
Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...
Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...
Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...IJERA Editor
 
Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...
Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...
Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...IJERA Editor
 
Optimization of EDM Process of (Cu-W) EDM Electrodes on Different Progression
Optimization of EDM Process of (Cu-W) EDM Electrodes on Different ProgressionOptimization of EDM Process of (Cu-W) EDM Electrodes on Different Progression
Optimization of EDM Process of (Cu-W) EDM Electrodes on Different ProgressionIJERA Editor
 
Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...
Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...
Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...IJERA Editor
 

Viewers also liked (19)

S4408100102
S4408100102S4408100102
S4408100102
 
Implementation for Controller to Unified Single Phase Power Flow Using Digita...
Implementation for Controller to Unified Single Phase Power Flow Using Digita...Implementation for Controller to Unified Single Phase Power Flow Using Digita...
Implementation for Controller to Unified Single Phase Power Flow Using Digita...
 
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...
 
Design of Automated Rotory Cage Type Fixture for Cylinder Block
Design of Automated Rotory Cage Type Fixture for Cylinder BlockDesign of Automated Rotory Cage Type Fixture for Cylinder Block
Design of Automated Rotory Cage Type Fixture for Cylinder Block
 
Future Internet: Challenge And Research Trend
Future Internet: Challenge And Research TrendFuture Internet: Challenge And Research Trend
Future Internet: Challenge And Research Trend
 
A411010107
A411010107A411010107
A411010107
 
Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...
Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...
Prediction of Weld Quality of A Tungsten Inertr Gas Welded Mild Steel Pipe Jo...
 
Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...
Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...
Hepatoprotective Activity of Cinnamon Zeylanicum Leaves against Alcohol Induc...
 
Optimization of EDM Process of (Cu-W) EDM Electrodes on Different Progression
Optimization of EDM Process of (Cu-W) EDM Electrodes on Different ProgressionOptimization of EDM Process of (Cu-W) EDM Electrodes on Different Progression
Optimization of EDM Process of (Cu-W) EDM Electrodes on Different Progression
 
Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...
Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...
Geological-Structural Setting of Massif and the Levels of Quartz - Sulphide M...
 
X04504144149
X04504144149X04504144149
X04504144149
 
T04404121128
T04404121128T04404121128
T04404121128
 
T0440899104
T0440899104T0440899104
T0440899104
 
R44099498
R44099498R44099498
R44099498
 
Aa044190194
Aa044190194Aa044190194
Aa044190194
 
Q044114119
Q044114119Q044114119
Q044114119
 
A044050107
A044050107A044050107
A044050107
 
A044060107
A044060107A044060107
A044060107
 
K43056467
K43056467K43056467
K43056467
 

Similar to Comparative Analysis of Lossless Image Compression Techniques

Design of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABDesign of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABIJEEE
 
0 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-50 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-5Alexander Decker
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
Review On Fractal Image Compression Techniques
Review On Fractal Image Compression TechniquesReview On Fractal Image Compression Techniques
Review On Fractal Image Compression TechniquesIRJET Journal
 
Jpeg image compression using discrete cosine transform a survey
Jpeg image compression using discrete cosine transform   a surveyJpeg image compression using discrete cosine transform   a survey
Jpeg image compression using discrete cosine transform a surveyIJCSES Journal
 
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...IRJET Journal
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr spaceIJECEIAES
 
Lossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyIRJET Journal
 
An approach for color image compression of bmp and tiff images using dct and dwt
An approach for color image compression of bmp and tiff images using dct and dwtAn approach for color image compression of bmp and tiff images using dct and dwt
An approach for color image compression of bmp and tiff images using dct and dwtIAEME Publication
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueIJERA Editor
 
Improved block based segmentation for jpeg
Improved block based segmentation for jpegImproved block based segmentation for jpeg
Improved block based segmentation for jpegeSAT Publishing House
 
An improved image compression algorithm based on daubechies wavelets with ar...
An improved image compression algorithm based on daubechies  wavelets with ar...An improved image compression algorithm based on daubechies  wavelets with ar...
An improved image compression algorithm based on daubechies wavelets with ar...Alexander Decker
 
Performance Analysis of Compression Techniques Using SVD, BTC, DCT and GP
Performance Analysis of Compression Techniques Using SVD, BTC, DCT and GPPerformance Analysis of Compression Techniques Using SVD, BTC, DCT and GP
Performance Analysis of Compression Techniques Using SVD, BTC, DCT and GPIOSR Journals
 
Wavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile DevicesWavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile Devicescsandit
 
Quality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionQuality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionIJTET Journal
 
Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression IJECEIAES
 
A spatial image compression algorithm based on run length encoding
A spatial image compression algorithm based on run length encodingA spatial image compression algorithm based on run length encoding
A spatial image compression algorithm based on run length encodingjournalBEEI
 

Similar to Comparative Analysis of Lossless Image Compression Techniques (20)

Design of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABDesign of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLAB
 
0 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-50 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-5
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
Review On Fractal Image Compression Techniques
Review On Fractal Image Compression TechniquesReview On Fractal Image Compression Techniques
Review On Fractal Image Compression Techniques
 
Jpeg image compression using discrete cosine transform a survey
Jpeg image compression using discrete cosine transform   a surveyJpeg image compression using discrete cosine transform   a survey
Jpeg image compression using discrete cosine transform a survey
 
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
Comparative Analysis of Huffman and Arithmetic Coding Algorithms for Image Co...
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr space
 
Lossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative Study
 
An approach for color image compression of bmp and tiff images using dct and dwt
An approach for color image compression of bmp and tiff images using dct and dwtAn approach for color image compression of bmp and tiff images using dct and dwt
An approach for color image compression of bmp and tiff images using dct and dwt
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
 
Improved block based segmentation for jpeg
Improved block based segmentation for jpegImproved block based segmentation for jpeg
Improved block based segmentation for jpeg
 
An improved image compression algorithm based on daubechies wavelets with ar...
An improved image compression algorithm based on daubechies  wavelets with ar...An improved image compression algorithm based on daubechies  wavelets with ar...
An improved image compression algorithm based on daubechies wavelets with ar...
 
Performance Analysis of Compression Techniques Using SVD, BTC, DCT and GP
Performance Analysis of Compression Techniques Using SVD, BTC, DCT and GPPerformance Analysis of Compression Techniques Using SVD, BTC, DCT and GP
Performance Analysis of Compression Techniques Using SVD, BTC, DCT and GP
 
B017120611
B017120611B017120611
B017120611
 
Wavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile DevicesWavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile Devices
 
Quality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionQuality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint Compression
 
Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression
 
A spatial image compression algorithm based on run length encoding
A spatial image compression algorithm based on run length encodingA spatial image compression algorithm based on run length encoding
A spatial image compression algorithm based on run length encoding
 

Recently uploaded

Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Recently uploaded (20)

Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 

Comparative Analysis of Lossless Image Compression Techniques

  • 1. Ramandeep Kaur Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 3), August 2014, pp.56-60 www.ijera.com 56 | P a g e Comparative Analysis of Lossless Image Compression Based On Row By Row Classifier and Various Encoding Schemes on Color Images Ramandeep Kaur, Dr. Sukhjeet K. Ranade M.Tech (CSE), Department of Computer Science, Punjabi University, Patiala. Assistant Professor, Department of Computer Science, Punjabi University, Patiala. ABSTRACT Lossless image compression is needed in many fields like medical imaging, telemetry, geophysics, remote sensing and other applications, which require exact replica of original image and loss of information is not tolerable. In this paper, a near lossless image compression algorithm based on row by row classifier with encoding schemes like Lempel Ziv Welch (LZW), Huffman and Run Length Encoding (RLE) on color images is proposed. The algorithm divides the image into three parts R, G and B, apply row by row classification on each part and result of this classification is records in the mask image. After classification the image data is decomposed into two sequences each for R, G and B and mask image is hidden in them. These sequences are encoded using different encoding schemes like LZW, Huffman and RLE. An exhaustive comparative analysis is performed to evaluate these techniques, which reveals that the proposed algorithm have smaller bits per pixel (bpp) than simple LZW, Huffman and RLE encoding techniques. I. INTRODUCTION In today era of computer industry, the major challenges are to minimize the time of transmission data over network and reduce the storage space. Transmission time can be reduced significantly by reducing the size of data files. A data file can be text, graphic images, audio, video or algorithms. Reducing the size of data files also minimize the storage capacity or space requirement on the computer. In many fields like medical imaging, remote sensing, military affairs and scientific research, both low storage consumption and high image quality is required. Therefore lossless and near lossless compression methods are strongly needed. Bit-plane encoding, Run Length Encoding (RLE), Huffman, Lempel Ziv Welch (LZW), arithmetic encoding and lossless predictive encoding are all popular lossless compression methods [1].Data compression is the technique to reduce the size of data files by reducing redundancy, which helps to decrease data storage requirements and hence minimize time and communication cost [2]. It can also be defined as the method of encoding rules that allow substantial reduction in the total number of bits to store or transmit a file [3]. Image compression is the application of data compression on digital image. Image compression is the technique to reduce redundant and irrelevant image data in order to store or transmit data over network in very efficient form. Image compression can be of two types, lossless image compression and lossy image compression. If the process of redundancy removing is reversible i.e. the exact reconstruction of the original image can be achieved then it is known as lossless image compression [4]. Lossless image compression methods used in applications like medical imaging, scientific images, satellite imaging, artificial images remote sensing and forensic analysis. On the other side lossy compression methods are used in web browsing, photography, image editing and printing [4-6]. In lossy compression there is a problem of compression artifacts, because it works on low bit rate. Yang and Bourbakis presented a paper to discuss the comparison of various lossless compression schemes depending upon their performance. Lossless image compression can always be modeled as a two stage procedure first one is décor-relation and second is entropy coding [4]. A new compression scheme based on sub block interchange (SBI) was proposed by Ng and Cheng [7]. When this scheme is compared with Burrows and Wheeler Transformation (BWT) [8], SBI gains a little bit improvement in the compresses ratio but have a greater improvement in the compression speed. BWT takes much longer time for compression than GIF because input data requires a sorting procedure based on quick sort algorithm [8]. Triantafyllidis and Strintzis presented a technique for the implementation of context based adaptive arithmetic entropy coding. A drawback of arithmetic coding of images using the above adaptive model is that it does not take into account the high amount of correlation between adjacent pixels [9]. Yao-hua et al. presented a paper in which a near-lossless image compression algorithm using classification, RESEARCH ARTICLE OPEN ACCESS
  • 2. Ramandeep Kaur Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 3), August 2014, pp.56-60 www.ijera.com 57 | P a g e information hiding and LZW is proposed. The algorithm takes advantage of the effects of the distribution of pixels on compression ratio. In the proposed algorithm, pixels of an image are classified row by row; pixels similar in value are gathered and the classification result is recorded in a mask image [1].In this paper lossless compression algorithm on color images having 24 bits per pixel (bpp) value is proposed using row by row classifier and different popular encoding schemes like LZW, Huffman and RLE. The proposed algorithm is a preprocessing stage followed by different encoding schemes which helps to reduce the size of image more than that of simple encoding schemes. II. THE PROPOSED ALGORITHM The proposed algorithm is mainly data re-ordering process before applying the compression technique. To achieve better compression from a compression technique, input data may be processed in such a manner that correlation among the elements of the data can be increased. Here pixels of an image taken row by row are placed in two groups based on a threshold value. So that pixels having similar values fall in a same group. That is more correlation can achieve in the values of pixels. The proposed algorithm consists of 4 steps which are shown in Fig. 1. These steps are discussed in following subsections. 2.1 Classification row by row In this step classification will be performed Row by row based on determining the threshold by using histogram of each row. Classification is done to put pixels in classes and pixels in same class must have similar value. Here classes will be divided according to the threshold calculated using histogram of each row. The number of classes will be six, two for each Red ( Clr1 ,Clr2 ), Green (Cl g1 , 2 Cl g ) and Blue ( 1 Clb , 2 Clb ).After calculating threshold for each row, the pixels of each part (R, G and B) can be classified using below method: For Red part 1 2 ( , ) , ( , ) , Ir i j Clr Ir i j Clr     ( , ) ( ) ( , ) ( ) Ir i j thr i Ir i j thr i   Similarly we can classify Green and Blue parts. Ir represents Red part of original image, similarly Ib and Ig can be used for Blue and Green part. thr (i) represents threshold of each row of Red part, similarly thg(i) and thb(i) can be used for Green and Blue part. i and j represents rows and column respectively and i, j = 0, 1, 2……………..S-1. ( 1 Clr , 1 Cl g and 1 Clb ) and ( 2 Clr , 2 Cl g and 2 Clb ) represents classes belongs to great pixel value and small pixel value. Using threshold calculated above, a mask image Mr, Mg and Mb for red, green and blue part respectively can be formed of size S S by allotting 0 and 1 for each pixel value as given below. Mask image for Red Part is ( , ) 1, ( , ) 0, Mr i j Mr i j     ( , ) ( ) ( , ) ( ) Ir i j thr i Ir i j thr i   Similarly we can generate mask images Mg and Mb for Green and Blue part respectively. Mr, Mg and Mb contain the information of classification results. 2.2 Decomposition of image data After the classification of pixels, Original image is divided into six sequences, two for each Red, Green and Blue part and each sequence contains pixels of one class. Here the need to arrange the pixels of R,G and B part of image along the scan line by study row by row as given below :
  • 3. Ramandeep Kaur Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 3), August 2014, pp.56-60 www.ijera.com 58 | P a g e Dr={Ir (0, 0), Ir (0, 1), Ir (0, 2)…………..Ir (0, S-1) ……………………………………………………… Ir (S-1, 0), Ir (S-1, 1)…………..……..Ir (S-1, S-1)} Similarly we can decompose Green (Dg) and Blue (Db) part of Image. Red part will be decomposed into two sequences 1 dr and 2 dr based on threshold calculating in step first, method performed is given below. 1 2 ( , ) , ( , ) , Ir i j dr Ir i j dr     ( , ) ( ) ( , ) ( ) Ir i j thr i Ir i j thr i   or or ( , ) 1 ( , ) 0 Mr i j Mr i j   Similarly we can calculate above for Green and Blue part. Where ( 1 dr , 2 dr ), ( 1 dg , 2 dg ), and ( 1 db , 2 db ) represents subsequences for Dr, Dg and Db respectively and contains the pixels with great pixel value and small pixel value. 2.3 Hiding the mask image Before hiding the mask image, the six decomposed sequences are combined into two sequences d1 and d2 depending upon their value calculated during decomposition. d1 = [ 1 dr 1 dg 1 db ] and d2 = [ 2 dr 2 dg 2 db ] For decoding process mask images Mr, Mg and Mb will be required and these mask images required extra storage space. To reduce this mask images will be hide in least significant bit (LSB) of d1 and d2. We need to arrange the mask images Mr, Mg and Mb according to scan line so that we can provide the exact value to LSB of exact pixel of the sequences d1 and d2. Now we will arrange the pixels of Mr, Mg and Mb along the scan line, we get a sequence of binary value Br, Bg and Bb as given below: Br= {Mr (0, 0), Mr (0, 1), Mr (0, 2)…….Mr (0, S-1) ………………………………………………………. Mr (S-1, 1), Mr (S-1, 2)……………..Mr (S-1, S-1)} And this approach will be similar to Bg and Bb. Now we hide the first element for Br i.e. Mr (0, 0) into LSB of first element of d1, then the second element Mr (0, 1) into second element of d1 and the process will be followed accordingly. When all the elements of d1 are used then elements of d2 will be used to hide the rest elements of mask image. To hide the mask image, we check the LSB of each element of d1 and d2. If the LSB of element or unassigned byte variable is 1, then we perform the “OR” operation with binary value of the element with 1 otherwise perform “AND” with 254. &254, |1, El El El   if if ( ) 0 ( ) 1 LSB El LSB El   And after performing this operation, result will be stored in two new sequences S1 and S2 as shown in Fig. 1. 2.4 Encoding and decoding using LZW, Huffman and RLE and getting LSB from sequences Now these two sequences S1 and S2 will be encoded and decoded using LZW, Huffman and RLE. LZW is an error free compression approach and helps to remove spatial redundancy present in an image [4]. LZW assigns fixed length code word to variable length sequence of source symbols; it does not require prior knowledge of the probability of the occurrence of the symbols to be encoded. LZW is a dictionary based compression algorithm. This compression algorithm is used in many imaging file format GIF, TIFF and PDF [1]. Huffman coding is entropy coding algorithm and is used for lossless data compression. It is a form of statistical coding applicable to many form of data transmission like text file, program files Run length encoding is a very simple form of data compression in which runs of data (that is, sequences in which the same data value occurs in many consecutive data elements) are stored as a single data value rather than as the original run. This is most useful on data that contains many such runs for example, simple graphic images such as icons, line drawings, and animations. Run-length encoding performs lossless data compression and is well suited to palette-based bitmapped images such as computer icons. It does not work well at all on continuous-tone images such as photographs, although JPEG uses it quite effectively on the coefficients that remain after transforming and quantizing image blocks. It is also used in fax machines. After the decoding process we will get LSB from sequences S1 and S2 and mask images Mr, Mg and Mb will be extracted accordingly. After applying all the above step in reverse process the original image will be reconstructed. III. EXPERIMENTAL RESULT AND COMPARATIVE ANALYSIS The above algorithm is performed on color images of size S S having 24bpp value using “Matlab” version 7.14.0.739. Some of the popular test images used are “Airplane”, “Baboon”, “Barbara”, “House”, “Leena”, “Livingroom”, “Pepper”, and “Tree”. From original image R, G and B part extracted first and then row by row classification and decomposition is performed which is followed by different encoding and decoding schemes. Fig. 2 shows the original image of “Leena” its mask images and reconstructed image.
  • 4. Ramandeep Kaur Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 3), August 2014, pp.56-60 www.ijera.com 59 | P a g e Fig. 2. Original Image, Mask Image (R, G and B) and Reconstructed Image (a) (b) (c) (d) (e) (f) (g) (h) (a)Airplane; (b) Baboon; (c) Barbara; (d) House; (e) Leena; (f) Livingroom; (g) Peppers; (h) Tree; Fig. 3. The Popular Test Images The bpp value of the test images using the proposed algorithm with different encoding schemes can be analyzed through graph as shown in Fig. 4. Average bpp value calculated using simple RLE is 20.36625 and using the proposed algorithm with RLE is 16.88 and in LZW it is 23.4975 and 20.31375 and in case of Huffman the value is 22.14 and 19.42625.From this we conclude that the image has smaller bpp value when compressed through the proposed algorithm. During comparative analysis between different encoding schemes using algorithm, the results shows that RLE have smaller bpp value as compared to LZW and Huffman. During the process of mask image hiding there is a possibility of change of LSBs, due to which there will be a noise in reconstructed image. However PSNR value of test images shows that there is very significant change in the quality of reconstructed images. It is very difficult to notice from naked eyes any difference between original image and reconstructed image. Table 1. shows PSNR values of test images
  • 5. Ramandeep Kaur Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 8( Version 3), August 2014, pp.56-60 www.ijera.com 60 | P a g e Fig. 4. The bpp Comparison of Image Using Different Methods Table 1. PSNR of Test Images IV. CONCLUSION AND FUTURE WORK A near lossless compression algorithm using row by row classification, mask image hiding, decomposition and different encoding schemes like LZW,RLE and Huffman is proposed on color images. Using Above algorithm smaller bpp value is obtained as compared to simple LZW, RLE and Huffman encoding. During comparative analysis between these encoding schemes using discussed algorithm we concluded that RLE have smaller bpp value as compared to other encoding schemes. In future task, other encoding schemes other than above discussed encoding techniques can be used on this correlation based algorithm to reduce the size of compressed image. REFERENCES [1] X. Yao-hua, T. Xiao-an and S. Mao-yin, “Image compression based on classification row by row and LZW encoding”. Congress on image and signal processing, 2008, pp. 617-621. [2] N.Ranganathan, S.G.Romaniuk and K.R. Namuduri, “A lossless image compression algorithm using variable blocks size segmentation”. IEEE Transactions on Image Processing, Vol. 4, No. 10, pp. 1396-1406, 1995. [3] M.-B. Lin, J.-F. Lee and G.E. Jan, “A lossless data compression and decompression algorithm and its hardware architecture”. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 14, No. 9, pp. 925-936, 2006. [4] M.Yang and N.Bourbakis, “An overview of lossless digital image compression techniques”. 48th Midwest Symposium on Circuits and Systems, 2005, pp. 1099-1102. [5] K. Sayood and K. Anderson, “A differential lossless image compression scheme”, IEEE Transactions on Signal Processing, Vol.40, No.1, pp. 236-241, 1992. [6] S.A. Hassan and M. Hussain, “Spatial domain lossless image data compression method”. International conference on information and communication technologies (ICICT), 2011, pp. 1-4. [7] K.S. Ng and L.M Cheng, “SUB-BLOCK interchange for lossless image compression”. IEEE Transactions on Consumer Electronics, Vol.45, No.1, pp. 236-241, 1999. [8] M. Burrows and D.J.Wheeler, “A Block- sorting lossless data compression algorithm”, SRC Research report 124, Digital Systems Research Center, Palo, Alto, 1994. [9] G.A. Triantafyllidis and M.G. Strintzis, “A Context based adaptive Arithmetic coding technique for lossless image compression”. Signal Processing Letters IEEE, Vol.6, No.7, pp. 168-170, 1999.