SlideShare a Scribd company logo
1 of 9
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 643
PERFORMANCE ANALYSIS ON FINGERPRINT IMAGE COMPRESSION
USING K-SVD-SR AND SPIHT
Aarthi P .1, Priya V.2
1 Research Scholar, Department of Computer Science, Vellalar College for Women Tamilnadu, India
2 Assistant Professor, Department of Computer Science, Vellalar College for Women Tamilnadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Digital image occupy a prominent place
due to the technological innovations. Image
compression minimizes the size in bits of a graphics file
without degrading the quality of the image. The
reduction in file size allows more images to be stored in
a certain amount of disk or memory space. It also
reduces the time necessary for images to be sent over
the internet or downloaded from web pages. Image
compression addresses the problem of reducing the
amount of data required to represent a digital image.
Recognition of persons by means of biometric
description is an important technology in the society,
because biometric identifiers cannot be shared and
they intrinsically characterize the individual’s bodily
distinctiveness. Among several biometric recognition
technologies, fingerprint compression is very popular
for personal identification. This research work has been
performed on lossless image compression technique in
comparison between K-Singular Value Decomposition-
Sparse Representation (K-SVD-SR) and Set Partitioning
In Hierarchical Trees (SPIHT) in fingerprint
compression. K-SVD-SR algorithm has been taken to
compare the reconstructed image quality in terms of
mean square error (MSE) and peak signal-to-noise ratio
(PSNR) with SPIHT.
Key Words: K-Singular Value Decomposition-Sparse
Representation (K-SVD-SR), Set Partitioning In
Hierarchical Trees (SPIHT), mean square error (MSE) and
peak signal-to-noise ratio (PSNR).
1. INTRODUCTION
With the increasing growth of technology and the entrance
into the digital age, one has to handle a large amount of
information every time which often presents difficulties.
So, the digital information must be stored and retrieved in
an efficient and effective manner, in order for it to be put
to practical us. Wavelets provide a mathematical way of
encoding information in such a way that it is layered
according to level of details. This layering facilitates
approximations at various intermediate stages. These
approximations can be stored using a lot less space than
the original data.
The image is actually a kind of redundant data i.e. it
contains the same information from certain perspective of
view. By using data compression techniques, it is possible
to remove some of the redundant information contained in
images. Image compression minimizes the size in bytes of
a graphics file without degrading the quality of the image
to an unacceptable level. The reduction in file size allows
more images to be stored in a certain amount of disk or
memory space.
Images contain large amounts of information that requires
much storage space, large transmission bandwidths and
long transmission times. Therefore it is advantageous to
compress the image by storing only the essential
information needed to reconstruct the image. An image
can be thought of as a matrix of pixel (or intensity) values.
In order to compress the image, redundancies must be
exploited, (i.e.) areas where there is little or no change
between pixel values. Hence images having large areas of
uniform color will have large redundancies, and
conversely images that have frequent and large changes in
color will be less redundant and harder to compress.
Visual communication is becoming increasingly important
with applications in several areas such as multimedia,
communication, transmission and storage of remote
sensing images, education and business documents, and
medical images.
2. METHODOLOGY
2.1 K-SVD-SR
The K-SVD (K-Singular Value Decomposition) is not
effective when the dictionary size is too large. So a new
compression standard based on sparse approximation is
introduced. Without the ability of learning, the fingerprint
images can’t be compressed well now. So, a novel based on
K-SVD-SR (K-Singular Value Decomposition-Sparse
Representation) is given in this work. The proposed
method has the ability by updating the dictionary.
Construct the dictionary
Constructing the dictionary is the foremost step in sparse
representation. A set of training fingerprints including a
major pattern types is used to construct a dictionary of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 644
fingerprint patches. The distribution of different pattern in
this set and the distribution in the other database need not
be similar they can be dissimilar also.
Three different ways to construct the dictionary,
 Choose the Algorithm Parameters
 Comparing the Fingerprint Patches
 Design the Training Set
Choose the Algorithm Parameters
The size of patches and compression efficiency are directly
related. If the dictionary is quite large the arbitrary patch
can be represented well which causes more computational
complexity. Only with experiments the size of the patch is
chosen.
Comparing the Fingerprint Patches
Normally, the fingerprint images are not the multiple sizes
of patches. Matching Pursuit is a type of sparse
approximation which finds the “Best Matching”
projections of multidimensional data onto over complete
dictionary. In MP dictionary atoms taken once never taken
again; there by reduces the total algorithm complexity.
Design the Training Set
Here have to consider many details to target the problem
of fingerprint. They are, number of training samples,
components of the training set and how to modify the
dictionary.
Divided into patches
The Fingerprint image is divided into square patches
which have the same size with the training patches. In Fig-
1 the new Fingerprint image is given. The size of the
patches has a direct impact on the compression efficiency.
The algorithm becomes more efficient as the size
increases. In addition, to make the patches fit the
dictionary better, the mean of each patch needs to be
calculated and subtracted from the patch.
Fig –1: A New Fingerprint Image
Fig -2: A Sample K-SVD-SR Dictionary
Here, the similarity measure between two patches is
calculated by solving the optimization problem.
S(P1, P2) = – t
F is the Frobenius norm. P1 and P2 are the corresponding
matrices of two patches. t, a parameter of the optimization
problem, is a scaling factor. Repeat the second step until
all patches have been tested.
K-Singular Value Decomposition–Sparse
Representation (K-SVD-SR) implementation
This implementation describes about how to use K-SVD-
SR algorithm for fingerprint compression. Which includes
the steps are,
 Create the dictionary
 Compressing the fingerprint
 Coding and Quantization
Create the Dictionary
In this work, the dictionary will be constructed in three
ways. First construct a training set, then the dictionary is
obtained from the set, finally cut them into fixed-size of
square patches. Given these patches after the initial
screening, a greedy algorithm is employed to construct the
training samples. The first patch is added to the
dictionary, which is initially empty. Then check whether
the next patch is sufficiently similar to all patches in the
dictionary. If yes, the next patch is tested; otherwise, the
patch is added into the dictionary. Here, the similarity
measure between two patches is calculated by solving the
optimization problem. The dictionary is obtained by
iteratively solving an optimization problem. When using
approximation methods with a fixed number of
coefficients found out that Orthogonal Matching Pursuit
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 645
(OMP) proves to be the best in terms of getting the best
out of each iteration.
s.t. ∀i, ǁXi ǁ0 < T
Y is consisted of the training patches, A is the dictionary, X
are the coefficients and Xi is the ith column of X. In the
sparse solving stage, compute the coefficients matrix X
using MP method, which guarantees that the coefficients
vector Xi has no more than T non-zero elements. Then,
update each dictionary element based on the K-SVD-SR.
However, from a run-time point of view, OMP was found
to lead to far more efficient overall algorithm.
Since the number of data elements is much larger than the
number of dictionary elements, our model assumption
suggests that the dictionary atoms are of equal
importance, such replacement is very effective in avoiding
local minima and over-fitting. Similar to the idea of
removal of unpopular elements from the dictionary, found
that it is very effective to prune the dictionary from having
too-close elements. If indeed such a pair of atoms is found,
one of those elements should be removed and replaced
with the least-represented signal.
Compressing the fingerprint
A new fingerprint is slices it into square patches which
have the same size with the training patches. The size of
the patches has a direct impact on the compression
efficiency. The algorithm becomes more efficient as the
size increases. However, the computation complexity and
the size of the dictionary also increase rapidly. The proper
size should be chosen. In addition, to make the patches fit
the dictionary better, the mean of each patch needs to be
calculated and subtracted from the patch. After that,
compute the sparse representation for each patch. Those
coefficients whose absolute values are less than a given
threshold are treated as zero. For each patch, Four kinds of
information need to be recorded they are, the mean value,
the number about how many atoms to use, the coefficients
and the location. The test shows that many image patches
require few coefficients. Consequently, compared with the
use of a fixed number of coefficients, the method reduces
the coding complexity and improves the compression
ratio.
Coding and Quantization
Entropy coding of the atom number of each patch, the
mean value of each patch, the coefficients and the indexes
is carried out by static arithmetic coders. The atom
number of each patch is separately coded. The mean value
of each patch is also separately coded. The quantization of
coefficients is performed which are obtained from the
training set over the dictionary. The first coefficient of
each block is quantized with a larger number of bits than
other coefficients and coded using a separate coder. The
first index and other indexes are coded by the same
arithmetic encoder. The first coefficient is quantized with
6 bits and other coefficients are quantized with 4 bits.
Fig -3 depicts the architecture of the K-SVD-SR algorithm
for the compression of the finger print images
Fig -3: Architectural diagram for K-SVD-SR
 The fingerprint is to be sliced into small
patches.
 Have to calculate the mean of each patch and it
is subtracted from the patch.
 Matching pursuit (MP) method is used to solve
the minimization problem for each patch.
 If the absolute value of a coefficient is less than
a given threshold, then it’s assumed as zero. Then
the remaining coefficients and their locations are
recorded.
 Finally have to encode the atom number of
each patch, the mean value of each patch, and the
indexes, quantize and encode the coefficients.
 Then the compressed stream is output.
2.2 SPIHT
SPIHT (Set Partitioning In Hierarchical Trees) is an
image compression algorithm that exploits the inherent
similarities across the subbands in a wavelet
decomposition of an image.
The SPIHT algorithm is a more efficient implementation of
EZW (Embedded Zero Wavelet) algorithm. After applying
wavelet transform to an image, the SPIHT algorithm
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 646
partitions the decomposed wavelet into significant and
insignificant partitions based on the three lists. They are
 The List of Insignificant Pixels (LIP)
 The List of Insignificant Sets (LIS)
 The List of Significant Pixels (LSP)
The List of Insignificant Pixels (LIP)
It contains individual coefficients that have
magnitudes smaller than the thresholds.
The List of Insignificant Sets (LIS)
It contains set of wavelet coefficients that are defined
by tree structures and are found to have magnitudes
smaller than the threshold.
The List of Significant Pixels (LSP)
It is a list of pixels found to have magnitudes larger
than the threshold (significant).
Spatial orientation trees
A 2-D biorthogonal wavelet transform is applied to an
image to produce a coarse-to-fine pyramid structure of
sub-images.
Fig-4: Parent-Offspring dependencies in Spatial
Orientation Trees
Normally, most of the images energy is concentrated the
low frequency components. Consequently, the various
decreases as one move from the highest to the lowest of
the subband pyramid. There is a spatial self similarity
between subbands, and the coefficients are expected to be
better magnitude-ordered as one move downward in the
pyramid following the same spatial orientation.
A tree structure, called spatial orientation tree, naturally
defines the spatial relationship on the hierarchical
pyramid. Fig -4 shows how the spatial orientation tree is
defined in a pyramid constructed with recursive four band
splitting. Each node of the tree corresponds to a pixel, and
is identified by the pixel coordinate. Its direct descendants
(offspring) correspond to the pixels of the same spatial
orientation in the next finer level of the pyramid. The tree
is defined in such a way that each node has either no
offsprings, which always form a group of 2x2 adjacent
pixels. The pixels in the highest level of the pyramid are
the tree roots and are also grouped in 2x2 adjacent pixels.
However, their offspring branching in different, and in
each group one of has no descendants. Part of the spatial
orientation trees are used as the partitioning subset in the
sorting.
In the SPIHT, scalar quantization algorithm commencing
at the coarsest resolution, the coefficients are tested
against a threshold. Compression is achieved by assigning
a single bit to any set for which all members are below the
threshold (insignificant). The threshold is found as
= 2[ max| ]
Where is the coefficient oat coordinate (i, j) in the
image. The decomposition process is repeated until reach
the final scale.
One of the most powerful wavelet based image
compression techniques is SPIHT. The main advantages of
SPIHT method are it can provide Good Image quality with
high PSNR and it is the best method for progressive Image
transmission. SPIHT algorithm is represented by the
equation as follows
(T) =
(𝑇), is the importance of a set of coordinate T. 𝐶𝑖,, is the
coefficient value at each coordinate (i, j). The List of
Significant Pixel (LSP) and List of Insignificant Set (LIS)
lists contain the coordinates of coefficients. The LSP list is
initially empty. In each pass, the members of the List of
Insignificant Pixel (LIP) are first processed, then the
members of LIS. This is essentially the significance map
encoding step. In the refinement step the elements of LSP
are processed. Each coordinate contained in LIP is
examined first.
3. RESULTS AND DISCUSSION
This chapter deals with comparison between K-Singular
Value Decomposition-Sparse Representation (K-SVD-SR)
and Set Partitioning In Hierarchical Trees (SPIHT) in
fingerprint compression. To test the effectiveness of this
proposed system, the image quality should be evaluated
objectively, two of the error metrics used to evaluate the
image quality one is Mean Square Error (MSE) and
another one is the Peak Signal to Noise Ratio (PSNR).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 647
PSNR = 10 (
Where
MSE =
Where a = Input image size
b = Output image size
M = Number of rows
N = Number of columns
Compression Ratio is one of several measures that are
commonly used to express the efficiency of a compression
method. It is calculated as
Compression ratio =
Nearly 50 fingerprint images are randomly downloaded
from various websites. Fig- 5 shows the sample of the
images in the database.
Fig- 5: Fingerprint Image Database
Fingerprint image compression using K-SVD-SR
algorithm
A sample image Fingerprint image1 has been taken from
the Fingerprint image database, which is shown in Fig- 6.
Fig – 6: Sample Fingerprint image(Fing1)
The dictionary constructed value of the image is shown in
the Fig-7.
Fig – 7: Dictionary constructed value of fingerprint
compression for k-svd-sr .
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 648
Fig- 8: Patch Conversion for Fingerprint image1 using K-
SVD-SR.
Patch Conversion for Fingerprint image1 using K-SVD-SR
algorithm is shown in the Fig- 8.
After applying the K-SVD-SR on Fingerprint image1, the
reconstructed image is shown in Fig- 9.
Fig- 9: K-SVD-SR reconstructed image
After applying thr K SVD- SR algorithm . the resultant for
the reconstructed image is shown in the Fig- 10.
The size of the reconstructed image is 6 kb. The PSNR
ratio, MSE, CR and Throughput time of the Fingerprint
image1 are 5.31, 18.0, 5:2, and 94ms respectively.
Fig- 10: Fingerprint image(Fing1) compression using K-
SVD-SR algorithm
The Table -1 depicts the Compression result for the K
SVD-SR algorithm result . For the sample finger print
image the resultant values of PSNR, MSE, CR and
Throughput time are given.
Table -1: Compression result for K-SVD-SR algorithm
Serial
Number
Fingerprint
Name
Before
Compression
(KB)
After
Compression
(KB)
Throughput
Time (ms)
PSNR MSE CR
1 Fing1 15 6 63 5.31 18
5:2
2 Fing2 20 8 62 5.02 25
5:2
3 Fing3 18 7 63 5.17 21.25
18:7
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 649
Chart 1: Resultant graph for K-SVD-SR algorithm
The Chart- 1 shows the resultant graph for the fingerprint
compression of sample images using K-SVD-SR algorithm
Fingerprint image compression using SPIHT
algorithm
A sample image Fingerprint image1 has been taken from
the Fingerprint image database, which is shown in Fig- 11.
Fig-11: Sample Fingerprint image (Fing1)
Fig-12: Processing list for SPIHT
Fig-12 shows the processing list value for fingerprint
compression using SPIHT algorithm. It splits the values for
further process of compression. Thus the processing list
helps to find the significant value. After that encoding and
decoding the bitstream into the image.
The reconstructed image is displayed, which is shown in
the Fig- 13.
Fig- 13: Compressed image using SPIHT
Fig- 14 depicts the resulatant values for the sample
fingerprint image compression using SPIHT algorithm. The
size of the reconstructed image is 3 kb. The PSNR ratio,
MSE, CR and Throughput time of the Fingerprint image1
are 27.09, 12.7, 5:1, and 47ms respectively.
Fig-14: Fingerprint image compression using SPIHT
algorithm
Table- 2: Compression Result For SPIHT Algorithm
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 650
S .No
Fingerprint
Name
Before
Compression
(KB)
After
Compression
(KB)
Throughput
Time (ms)
PSNR MSE CR
1 Fing1 15 3 31 27.09 12.7 5:1
2 Fing2 20 4 47 25.83 17 5:1
3 Fing3 18 4 31 26.12 15.9 9:2
The Table- 2 shows the PSNR, MSE, CR and Throughput
time for sample fingerprint image compression using
SPIHT algorithm. The Chart- 2 shows the resultant graph
for the fingerprint image compression using SPIHT
algorithm.
Chart- 2: Resultant Graph for SPIHT algorithm
The Table- 3 depicts the comparison result for fingerprint
image compression using SPIHT algorithm
Table- 3: Comparison of K-SVD-SR and SPIHT
S.
No
Finger
print
Name
Before
Compression
(kb)
After
Compression
(kb) K-SVD -
SR
After
Compression
(kb) SPIHT
1 Fing1 15 6 3
2 Fing2 20 8 4
3 Fing3 18 7 4
Hence the result proves, SPIHT can compress and
reconstruct the image without changing the originality and
the quality of the images is better than the K-SVD-SR
algorithm.
7. CONCLUSION AND FUTURE WORK
CONCLUSION
This research work presents the comparison between K-
Singular Value Decomposition-Sparse Representation
(K-SVD-SR) and Set Partitioning In Hierarchical Trees
(SPIHT) in Fingerprint Compression. Various fingerprint
images in terms of size, quality and computational time
are compressed using SPIHT and K-SVD-SR. The qualities
of the fingerprint images are evaluated by the PSNR (Peak
Signal To Noise Ratio), MSE (Mean Square Error) and CR
(Compression Ratio).
By examining the PSNR and MSE values both in K-SVD-SR
and SPIHT algorithm, SPIHT proves and promises that it
can compress and reconstruct the image without changing
the originality and the quality of the input image. From the
experiment results it can be concluded that the SPIHT
algorithm is effective and efficient than the K-SVD-SR
algorithm in terms of PSNR, MSE, CR and computational
time.
FUTURE WORK
This research can further be extended with the following
novel ideas,
 Machine learning approaches and artificial
intelligence techniques can be used for image
compression and compare with SPIHT results.
 Other biometric identifiers like Face recognition,
DNA, Palm print, Hand geometry, Iris recognition,
Retina also can be used in SPIHT for compression
REFERENCES
[1] Chandandeep Kaur and Sumit Budhiraja,
“Improvements of SPIHT in Image Compression-
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 651
Survey”, International Journal of Emerging
Technology and Advanced Engineering, 2250-
2459, 2013.
[2] Amandeep Kaur and Monica Goyal, “ROI Based
Image Compression of Medical Images”
International Journal of Computer Science Trends
and Technology, 2347-8578, 2014.
[3] Narasimhulu .S and Ramashri .T, “Gray-Scale
Image Compression Using DWT-SPIHT
Algorithm”, International Journal of Engineering
Research and Applications, 2248-9622, 2012.
[4] Meng Wang and Qi-rui Han, “An improved
Algorithm of SPIHT based on the Human Visual
Characteristics”, World Academy of Science,
Engineering and Technology, 2008.
[5] Nagamani .K and Ananth .A.G, “Image
Compression Techniques for High Resolution
Satellite Imageries using Classical Lifting Scheme”,
International Journal of Computer Applications,
0975-8887, 2011.
[6]Ritu Chourasiya and Ajit Shrivastava, “ A Study
of Image Compression based Transmission
Algorithm using SPIHT for Low Bit Rate
application”, Advanced Computing: An
International Journal, 2012.
[7] Wang Shu-zhong, “Sparse Matrix of Image
Denoising Method based on SVD”, International
Journal of Multimedia and Ubiquitous
Engineering, 2014.
[8] Yan Zhou and Heming Zhao, “Speech Signal
Compressed sensing based on K-SVD adaptive
dictionary”, Journal of Theoretical and Applied
Information Technology, 2013.

More Related Content

What's hot

Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual PredictionEfficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual Predictionsipij
 
Graph Signal Processing: an interpretable framework to link neurocognitive ar...
Graph Signal Processing: an interpretable framework to link neurocognitive ar...Graph Signal Processing: an interpretable framework to link neurocognitive ar...
Graph Signal Processing: an interpretable framework to link neurocognitive ar...Nicolas Farrugia
 
Dimensionality reduction
Dimensionality reductionDimensionality reduction
Dimensionality reductionShatakirti Er
 
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...IRJET Journal
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based patternijcsit
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...IJERA Editor
 
Scene Description From Images To Sentences
Scene Description From Images To SentencesScene Description From Images To Sentences
Scene Description From Images To SentencesIRJET Journal
 
Artificial Intelligence Certification
Artificial Intelligence CertificationArtificial Intelligence Certification
Artificial Intelligence Certificationkartikaryan4
 
Machine Learning Unit 4 Semester 3 MSc IT Part 2 Mumbai University
Machine Learning Unit 4 Semester 3  MSc IT Part 2 Mumbai UniversityMachine Learning Unit 4 Semester 3  MSc IT Part 2 Mumbai University
Machine Learning Unit 4 Semester 3 MSc IT Part 2 Mumbai UniversityMadhav Mishra
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniqueseSAT Publishing House
 
November, 2006 CCKM'06 1
November, 2006 CCKM'06 1 November, 2006 CCKM'06 1
November, 2006 CCKM'06 1 butest
 

What's hot (16)

Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual PredictionEfficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
 
Graph Signal Processing: an interpretable framework to link neurocognitive ar...
Graph Signal Processing: an interpretable framework to link neurocognitive ar...Graph Signal Processing: an interpretable framework to link neurocognitive ar...
Graph Signal Processing: an interpretable framework to link neurocognitive ar...
 
Dimensionality reduction
Dimensionality reductionDimensionality reduction
Dimensionality reduction
 
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...IRJET-  	  An Improved Technique for Hiding Secret Image on Colour Images usi...
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based pattern
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
 
Scene Description From Images To Sentences
Scene Description From Images To SentencesScene Description From Images To Sentences
Scene Description From Images To Sentences
 
Artificial Intelligence Certification
Artificial Intelligence CertificationArtificial Intelligence Certification
Artificial Intelligence Certification
 
Av4102350358
Av4102350358Av4102350358
Av4102350358
 
Presentation jitendra
Presentation jitendraPresentation jitendra
Presentation jitendra
 
Explainable AI
Explainable AIExplainable AI
Explainable AI
 
Presentation
PresentationPresentation
Presentation
 
Machine Learning Unit 4 Semester 3 MSc IT Part 2 Mumbai University
Machine Learning Unit 4 Semester 3  MSc IT Part 2 Mumbai UniversityMachine Learning Unit 4 Semester 3  MSc IT Part 2 Mumbai University
Machine Learning Unit 4 Semester 3 MSc IT Part 2 Mumbai University
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
 
November, 2006 CCKM'06 1
November, 2006 CCKM'06 1 November, 2006 CCKM'06 1
November, 2006 CCKM'06 1
 

Similar to Performance Analysis on Fingerprint Image Compression Using K-SVD-SR and SPIHT

A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...IRJET Journal
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Editor IJCATR
 
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...IRJET Journal
 
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine LearningSentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine LearningIRJET Journal
 
Sparse Sampling in Digital Image Processing
Sparse Sampling in Digital Image ProcessingSparse Sampling in Digital Image Processing
Sparse Sampling in Digital Image ProcessingEswar Publications
 
Design and Implementation of EZW & SPIHT Image Coder for Virtual Images
Design and Implementation of EZW & SPIHT Image Coder for Virtual ImagesDesign and Implementation of EZW & SPIHT Image Coder for Virtual Images
Design and Implementation of EZW & SPIHT Image Coder for Virtual ImagesCSCJournals
 
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSSVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSijscmcj
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniquesIRJET Journal
 
Image Compression Using Hybrid Svd Wdr And Svd Aswdr
Image Compression Using Hybrid Svd Wdr And Svd AswdrImage Compression Using Hybrid Svd Wdr And Svd Aswdr
Image Compression Using Hybrid Svd Wdr And Svd AswdrMelanie Smith
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEditor IJMTER
 
Density Based Clustering Approach for Solving the Software Component Restruct...
Density Based Clustering Approach for Solving the Software Component Restruct...Density Based Clustering Approach for Solving the Software Component Restruct...
Density Based Clustering Approach for Solving the Software Component Restruct...IRJET Journal
 
SVD and the Netflix Dataset
SVD and the Netflix DatasetSVD and the Netflix Dataset
SVD and the Netflix DatasetBen Mabey
 
IRJET - Face Recognition in Digital Documents with Live Image
IRJET - Face Recognition in Digital Documents with Live ImageIRJET - Face Recognition in Digital Documents with Live Image
IRJET - Face Recognition in Digital Documents with Live ImageIRJET Journal
 
Gradient Based Adaptive Beamforming
Gradient Based Adaptive BeamformingGradient Based Adaptive Beamforming
Gradient Based Adaptive BeamformingIRJET Journal
 
IRJET- Wavelet Transform along with SPIHT Algorithm used for Image Compre...
IRJET-  	  Wavelet Transform along with SPIHT Algorithm used for Image Compre...IRJET-  	  Wavelet Transform along with SPIHT Algorithm used for Image Compre...
IRJET- Wavelet Transform along with SPIHT Algorithm used for Image Compre...IRJET Journal
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...IEEEBEBTECHSTUDENTPROJECTS
 

Similar to Performance Analysis on Fingerprint Image Compression Using K-SVD-SR and SPIHT (20)

A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
 
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
An Optimized Parallel Algorithm for Longest Common Subsequence Using Openmp –...
 
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine LearningSentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
 
Real-Time Face Tracking with GPU Acceleration
Real-Time Face Tracking with GPU AccelerationReal-Time Face Tracking with GPU Acceleration
Real-Time Face Tracking with GPU Acceleration
 
CUDA Accelerated Face Recognition
CUDA Accelerated Face RecognitionCUDA Accelerated Face Recognition
CUDA Accelerated Face Recognition
 
Sparse Sampling in Digital Image Processing
Sparse Sampling in Digital Image ProcessingSparse Sampling in Digital Image Processing
Sparse Sampling in Digital Image Processing
 
Design and Implementation of EZW & SPIHT Image Coder for Virtual Images
Design and Implementation of EZW & SPIHT Image Coder for Virtual ImagesDesign and Implementation of EZW & SPIHT Image Coder for Virtual Images
Design and Implementation of EZW & SPIHT Image Coder for Virtual Images
 
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSSVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
Image Compression Using Hybrid Svd Wdr And Svd Aswdr
Image Compression Using Hybrid Svd Wdr And Svd AswdrImage Compression Using Hybrid Svd Wdr And Svd Aswdr
Image Compression Using Hybrid Svd Wdr And Svd Aswdr
 
F010232834
F010232834F010232834
F010232834
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
 
Density Based Clustering Approach for Solving the Software Component Restruct...
Density Based Clustering Approach for Solving the Software Component Restruct...Density Based Clustering Approach for Solving the Software Component Restruct...
Density Based Clustering Approach for Solving the Software Component Restruct...
 
SVD and the Netflix Dataset
SVD and the Netflix DatasetSVD and the Netflix Dataset
SVD and the Netflix Dataset
 
IRJET - Face Recognition in Digital Documents with Live Image
IRJET - Face Recognition in Digital Documents with Live ImageIRJET - Face Recognition in Digital Documents with Live Image
IRJET - Face Recognition in Digital Documents with Live Image
 
Gradient Based Adaptive Beamforming
Gradient Based Adaptive BeamformingGradient Based Adaptive Beamforming
Gradient Based Adaptive Beamforming
 
IRJET- Wavelet Transform along with SPIHT Algorithm used for Image Compre...
IRJET-  	  Wavelet Transform along with SPIHT Algorithm used for Image Compre...IRJET-  	  Wavelet Transform along with SPIHT Algorithm used for Image Compre...
IRJET- Wavelet Transform along with SPIHT Algorithm used for Image Compre...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Fingerprint compression-based-on-...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
 
N043020970100
N043020970100N043020970100
N043020970100
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

Performance Analysis on Fingerprint Image Compression Using K-SVD-SR and SPIHT

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 643 PERFORMANCE ANALYSIS ON FINGERPRINT IMAGE COMPRESSION USING K-SVD-SR AND SPIHT Aarthi P .1, Priya V.2 1 Research Scholar, Department of Computer Science, Vellalar College for Women Tamilnadu, India 2 Assistant Professor, Department of Computer Science, Vellalar College for Women Tamilnadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Digital image occupy a prominent place due to the technological innovations. Image compression minimizes the size in bits of a graphics file without degrading the quality of the image. The reduction in file size allows more images to be stored in a certain amount of disk or memory space. It also reduces the time necessary for images to be sent over the internet or downloaded from web pages. Image compression addresses the problem of reducing the amount of data required to represent a digital image. Recognition of persons by means of biometric description is an important technology in the society, because biometric identifiers cannot be shared and they intrinsically characterize the individual’s bodily distinctiveness. Among several biometric recognition technologies, fingerprint compression is very popular for personal identification. This research work has been performed on lossless image compression technique in comparison between K-Singular Value Decomposition- Sparse Representation (K-SVD-SR) and Set Partitioning In Hierarchical Trees (SPIHT) in fingerprint compression. K-SVD-SR algorithm has been taken to compare the reconstructed image quality in terms of mean square error (MSE) and peak signal-to-noise ratio (PSNR) with SPIHT. Key Words: K-Singular Value Decomposition-Sparse Representation (K-SVD-SR), Set Partitioning In Hierarchical Trees (SPIHT), mean square error (MSE) and peak signal-to-noise ratio (PSNR). 1. INTRODUCTION With the increasing growth of technology and the entrance into the digital age, one has to handle a large amount of information every time which often presents difficulties. So, the digital information must be stored and retrieved in an efficient and effective manner, in order for it to be put to practical us. Wavelets provide a mathematical way of encoding information in such a way that it is layered according to level of details. This layering facilitates approximations at various intermediate stages. These approximations can be stored using a lot less space than the original data. The image is actually a kind of redundant data i.e. it contains the same information from certain perspective of view. By using data compression techniques, it is possible to remove some of the redundant information contained in images. Image compression minimizes the size in bytes of a graphics file without degrading the quality of the image to an unacceptable level. The reduction in file size allows more images to be stored in a certain amount of disk or memory space. Images contain large amounts of information that requires much storage space, large transmission bandwidths and long transmission times. Therefore it is advantageous to compress the image by storing only the essential information needed to reconstruct the image. An image can be thought of as a matrix of pixel (or intensity) values. In order to compress the image, redundancies must be exploited, (i.e.) areas where there is little or no change between pixel values. Hence images having large areas of uniform color will have large redundancies, and conversely images that have frequent and large changes in color will be less redundant and harder to compress. Visual communication is becoming increasingly important with applications in several areas such as multimedia, communication, transmission and storage of remote sensing images, education and business documents, and medical images. 2. METHODOLOGY 2.1 K-SVD-SR The K-SVD (K-Singular Value Decomposition) is not effective when the dictionary size is too large. So a new compression standard based on sparse approximation is introduced. Without the ability of learning, the fingerprint images can’t be compressed well now. So, a novel based on K-SVD-SR (K-Singular Value Decomposition-Sparse Representation) is given in this work. The proposed method has the ability by updating the dictionary. Construct the dictionary Constructing the dictionary is the foremost step in sparse representation. A set of training fingerprints including a major pattern types is used to construct a dictionary of
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 644 fingerprint patches. The distribution of different pattern in this set and the distribution in the other database need not be similar they can be dissimilar also. Three different ways to construct the dictionary,  Choose the Algorithm Parameters  Comparing the Fingerprint Patches  Design the Training Set Choose the Algorithm Parameters The size of patches and compression efficiency are directly related. If the dictionary is quite large the arbitrary patch can be represented well which causes more computational complexity. Only with experiments the size of the patch is chosen. Comparing the Fingerprint Patches Normally, the fingerprint images are not the multiple sizes of patches. Matching Pursuit is a type of sparse approximation which finds the “Best Matching” projections of multidimensional data onto over complete dictionary. In MP dictionary atoms taken once never taken again; there by reduces the total algorithm complexity. Design the Training Set Here have to consider many details to target the problem of fingerprint. They are, number of training samples, components of the training set and how to modify the dictionary. Divided into patches The Fingerprint image is divided into square patches which have the same size with the training patches. In Fig- 1 the new Fingerprint image is given. The size of the patches has a direct impact on the compression efficiency. The algorithm becomes more efficient as the size increases. In addition, to make the patches fit the dictionary better, the mean of each patch needs to be calculated and subtracted from the patch. Fig –1: A New Fingerprint Image Fig -2: A Sample K-SVD-SR Dictionary Here, the similarity measure between two patches is calculated by solving the optimization problem. S(P1, P2) = – t F is the Frobenius norm. P1 and P2 are the corresponding matrices of two patches. t, a parameter of the optimization problem, is a scaling factor. Repeat the second step until all patches have been tested. K-Singular Value Decomposition–Sparse Representation (K-SVD-SR) implementation This implementation describes about how to use K-SVD- SR algorithm for fingerprint compression. Which includes the steps are,  Create the dictionary  Compressing the fingerprint  Coding and Quantization Create the Dictionary In this work, the dictionary will be constructed in three ways. First construct a training set, then the dictionary is obtained from the set, finally cut them into fixed-size of square patches. Given these patches after the initial screening, a greedy algorithm is employed to construct the training samples. The first patch is added to the dictionary, which is initially empty. Then check whether the next patch is sufficiently similar to all patches in the dictionary. If yes, the next patch is tested; otherwise, the patch is added into the dictionary. Here, the similarity measure between two patches is calculated by solving the optimization problem. The dictionary is obtained by iteratively solving an optimization problem. When using approximation methods with a fixed number of coefficients found out that Orthogonal Matching Pursuit
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 645 (OMP) proves to be the best in terms of getting the best out of each iteration. s.t. ∀i, ǁXi ǁ0 < T Y is consisted of the training patches, A is the dictionary, X are the coefficients and Xi is the ith column of X. In the sparse solving stage, compute the coefficients matrix X using MP method, which guarantees that the coefficients vector Xi has no more than T non-zero elements. Then, update each dictionary element based on the K-SVD-SR. However, from a run-time point of view, OMP was found to lead to far more efficient overall algorithm. Since the number of data elements is much larger than the number of dictionary elements, our model assumption suggests that the dictionary atoms are of equal importance, such replacement is very effective in avoiding local minima and over-fitting. Similar to the idea of removal of unpopular elements from the dictionary, found that it is very effective to prune the dictionary from having too-close elements. If indeed such a pair of atoms is found, one of those elements should be removed and replaced with the least-represented signal. Compressing the fingerprint A new fingerprint is slices it into square patches which have the same size with the training patches. The size of the patches has a direct impact on the compression efficiency. The algorithm becomes more efficient as the size increases. However, the computation complexity and the size of the dictionary also increase rapidly. The proper size should be chosen. In addition, to make the patches fit the dictionary better, the mean of each patch needs to be calculated and subtracted from the patch. After that, compute the sparse representation for each patch. Those coefficients whose absolute values are less than a given threshold are treated as zero. For each patch, Four kinds of information need to be recorded they are, the mean value, the number about how many atoms to use, the coefficients and the location. The test shows that many image patches require few coefficients. Consequently, compared with the use of a fixed number of coefficients, the method reduces the coding complexity and improves the compression ratio. Coding and Quantization Entropy coding of the atom number of each patch, the mean value of each patch, the coefficients and the indexes is carried out by static arithmetic coders. The atom number of each patch is separately coded. The mean value of each patch is also separately coded. The quantization of coefficients is performed which are obtained from the training set over the dictionary. The first coefficient of each block is quantized with a larger number of bits than other coefficients and coded using a separate coder. The first index and other indexes are coded by the same arithmetic encoder. The first coefficient is quantized with 6 bits and other coefficients are quantized with 4 bits. Fig -3 depicts the architecture of the K-SVD-SR algorithm for the compression of the finger print images Fig -3: Architectural diagram for K-SVD-SR  The fingerprint is to be sliced into small patches.  Have to calculate the mean of each patch and it is subtracted from the patch.  Matching pursuit (MP) method is used to solve the minimization problem for each patch.  If the absolute value of a coefficient is less than a given threshold, then it’s assumed as zero. Then the remaining coefficients and their locations are recorded.  Finally have to encode the atom number of each patch, the mean value of each patch, and the indexes, quantize and encode the coefficients.  Then the compressed stream is output. 2.2 SPIHT SPIHT (Set Partitioning In Hierarchical Trees) is an image compression algorithm that exploits the inherent similarities across the subbands in a wavelet decomposition of an image. The SPIHT algorithm is a more efficient implementation of EZW (Embedded Zero Wavelet) algorithm. After applying wavelet transform to an image, the SPIHT algorithm
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 646 partitions the decomposed wavelet into significant and insignificant partitions based on the three lists. They are  The List of Insignificant Pixels (LIP)  The List of Insignificant Sets (LIS)  The List of Significant Pixels (LSP) The List of Insignificant Pixels (LIP) It contains individual coefficients that have magnitudes smaller than the thresholds. The List of Insignificant Sets (LIS) It contains set of wavelet coefficients that are defined by tree structures and are found to have magnitudes smaller than the threshold. The List of Significant Pixels (LSP) It is a list of pixels found to have magnitudes larger than the threshold (significant). Spatial orientation trees A 2-D biorthogonal wavelet transform is applied to an image to produce a coarse-to-fine pyramid structure of sub-images. Fig-4: Parent-Offspring dependencies in Spatial Orientation Trees Normally, most of the images energy is concentrated the low frequency components. Consequently, the various decreases as one move from the highest to the lowest of the subband pyramid. There is a spatial self similarity between subbands, and the coefficients are expected to be better magnitude-ordered as one move downward in the pyramid following the same spatial orientation. A tree structure, called spatial orientation tree, naturally defines the spatial relationship on the hierarchical pyramid. Fig -4 shows how the spatial orientation tree is defined in a pyramid constructed with recursive four band splitting. Each node of the tree corresponds to a pixel, and is identified by the pixel coordinate. Its direct descendants (offspring) correspond to the pixels of the same spatial orientation in the next finer level of the pyramid. The tree is defined in such a way that each node has either no offsprings, which always form a group of 2x2 adjacent pixels. The pixels in the highest level of the pyramid are the tree roots and are also grouped in 2x2 adjacent pixels. However, their offspring branching in different, and in each group one of has no descendants. Part of the spatial orientation trees are used as the partitioning subset in the sorting. In the SPIHT, scalar quantization algorithm commencing at the coarsest resolution, the coefficients are tested against a threshold. Compression is achieved by assigning a single bit to any set for which all members are below the threshold (insignificant). The threshold is found as = 2[ max| ] Where is the coefficient oat coordinate (i, j) in the image. The decomposition process is repeated until reach the final scale. One of the most powerful wavelet based image compression techniques is SPIHT. The main advantages of SPIHT method are it can provide Good Image quality with high PSNR and it is the best method for progressive Image transmission. SPIHT algorithm is represented by the equation as follows (T) = (𝑇), is the importance of a set of coordinate T. 𝐶𝑖,, is the coefficient value at each coordinate (i, j). The List of Significant Pixel (LSP) and List of Insignificant Set (LIS) lists contain the coordinates of coefficients. The LSP list is initially empty. In each pass, the members of the List of Insignificant Pixel (LIP) are first processed, then the members of LIS. This is essentially the significance map encoding step. In the refinement step the elements of LSP are processed. Each coordinate contained in LIP is examined first. 3. RESULTS AND DISCUSSION This chapter deals with comparison between K-Singular Value Decomposition-Sparse Representation (K-SVD-SR) and Set Partitioning In Hierarchical Trees (SPIHT) in fingerprint compression. To test the effectiveness of this proposed system, the image quality should be evaluated objectively, two of the error metrics used to evaluate the image quality one is Mean Square Error (MSE) and another one is the Peak Signal to Noise Ratio (PSNR).
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 647 PSNR = 10 ( Where MSE = Where a = Input image size b = Output image size M = Number of rows N = Number of columns Compression Ratio is one of several measures that are commonly used to express the efficiency of a compression method. It is calculated as Compression ratio = Nearly 50 fingerprint images are randomly downloaded from various websites. Fig- 5 shows the sample of the images in the database. Fig- 5: Fingerprint Image Database Fingerprint image compression using K-SVD-SR algorithm A sample image Fingerprint image1 has been taken from the Fingerprint image database, which is shown in Fig- 6. Fig – 6: Sample Fingerprint image(Fing1) The dictionary constructed value of the image is shown in the Fig-7. Fig – 7: Dictionary constructed value of fingerprint compression for k-svd-sr .
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 648 Fig- 8: Patch Conversion for Fingerprint image1 using K- SVD-SR. Patch Conversion for Fingerprint image1 using K-SVD-SR algorithm is shown in the Fig- 8. After applying the K-SVD-SR on Fingerprint image1, the reconstructed image is shown in Fig- 9. Fig- 9: K-SVD-SR reconstructed image After applying thr K SVD- SR algorithm . the resultant for the reconstructed image is shown in the Fig- 10. The size of the reconstructed image is 6 kb. The PSNR ratio, MSE, CR and Throughput time of the Fingerprint image1 are 5.31, 18.0, 5:2, and 94ms respectively. Fig- 10: Fingerprint image(Fing1) compression using K- SVD-SR algorithm The Table -1 depicts the Compression result for the K SVD-SR algorithm result . For the sample finger print image the resultant values of PSNR, MSE, CR and Throughput time are given. Table -1: Compression result for K-SVD-SR algorithm Serial Number Fingerprint Name Before Compression (KB) After Compression (KB) Throughput Time (ms) PSNR MSE CR 1 Fing1 15 6 63 5.31 18 5:2 2 Fing2 20 8 62 5.02 25 5:2 3 Fing3 18 7 63 5.17 21.25 18:7
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 649 Chart 1: Resultant graph for K-SVD-SR algorithm The Chart- 1 shows the resultant graph for the fingerprint compression of sample images using K-SVD-SR algorithm Fingerprint image compression using SPIHT algorithm A sample image Fingerprint image1 has been taken from the Fingerprint image database, which is shown in Fig- 11. Fig-11: Sample Fingerprint image (Fing1) Fig-12: Processing list for SPIHT Fig-12 shows the processing list value for fingerprint compression using SPIHT algorithm. It splits the values for further process of compression. Thus the processing list helps to find the significant value. After that encoding and decoding the bitstream into the image. The reconstructed image is displayed, which is shown in the Fig- 13. Fig- 13: Compressed image using SPIHT Fig- 14 depicts the resulatant values for the sample fingerprint image compression using SPIHT algorithm. The size of the reconstructed image is 3 kb. The PSNR ratio, MSE, CR and Throughput time of the Fingerprint image1 are 27.09, 12.7, 5:1, and 47ms respectively. Fig-14: Fingerprint image compression using SPIHT algorithm Table- 2: Compression Result For SPIHT Algorithm
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 650 S .No Fingerprint Name Before Compression (KB) After Compression (KB) Throughput Time (ms) PSNR MSE CR 1 Fing1 15 3 31 27.09 12.7 5:1 2 Fing2 20 4 47 25.83 17 5:1 3 Fing3 18 4 31 26.12 15.9 9:2 The Table- 2 shows the PSNR, MSE, CR and Throughput time for sample fingerprint image compression using SPIHT algorithm. The Chart- 2 shows the resultant graph for the fingerprint image compression using SPIHT algorithm. Chart- 2: Resultant Graph for SPIHT algorithm The Table- 3 depicts the comparison result for fingerprint image compression using SPIHT algorithm Table- 3: Comparison of K-SVD-SR and SPIHT S. No Finger print Name Before Compression (kb) After Compression (kb) K-SVD - SR After Compression (kb) SPIHT 1 Fing1 15 6 3 2 Fing2 20 8 4 3 Fing3 18 7 4 Hence the result proves, SPIHT can compress and reconstruct the image without changing the originality and the quality of the images is better than the K-SVD-SR algorithm. 7. CONCLUSION AND FUTURE WORK CONCLUSION This research work presents the comparison between K- Singular Value Decomposition-Sparse Representation (K-SVD-SR) and Set Partitioning In Hierarchical Trees (SPIHT) in Fingerprint Compression. Various fingerprint images in terms of size, quality and computational time are compressed using SPIHT and K-SVD-SR. The qualities of the fingerprint images are evaluated by the PSNR (Peak Signal To Noise Ratio), MSE (Mean Square Error) and CR (Compression Ratio). By examining the PSNR and MSE values both in K-SVD-SR and SPIHT algorithm, SPIHT proves and promises that it can compress and reconstruct the image without changing the originality and the quality of the input image. From the experiment results it can be concluded that the SPIHT algorithm is effective and efficient than the K-SVD-SR algorithm in terms of PSNR, MSE, CR and computational time. FUTURE WORK This research can further be extended with the following novel ideas,  Machine learning approaches and artificial intelligence techniques can be used for image compression and compare with SPIHT results.  Other biometric identifiers like Face recognition, DNA, Palm print, Hand geometry, Iris recognition, Retina also can be used in SPIHT for compression REFERENCES [1] Chandandeep Kaur and Sumit Budhiraja, “Improvements of SPIHT in Image Compression-
  • 9. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 651 Survey”, International Journal of Emerging Technology and Advanced Engineering, 2250- 2459, 2013. [2] Amandeep Kaur and Monica Goyal, “ROI Based Image Compression of Medical Images” International Journal of Computer Science Trends and Technology, 2347-8578, 2014. [3] Narasimhulu .S and Ramashri .T, “Gray-Scale Image Compression Using DWT-SPIHT Algorithm”, International Journal of Engineering Research and Applications, 2248-9622, 2012. [4] Meng Wang and Qi-rui Han, “An improved Algorithm of SPIHT based on the Human Visual Characteristics”, World Academy of Science, Engineering and Technology, 2008. [5] Nagamani .K and Ananth .A.G, “Image Compression Techniques for High Resolution Satellite Imageries using Classical Lifting Scheme”, International Journal of Computer Applications, 0975-8887, 2011. [6]Ritu Chourasiya and Ajit Shrivastava, “ A Study of Image Compression based Transmission Algorithm using SPIHT for Low Bit Rate application”, Advanced Computing: An International Journal, 2012. [7] Wang Shu-zhong, “Sparse Matrix of Image Denoising Method based on SVD”, International Journal of Multimedia and Ubiquitous Engineering, 2014. [8] Yan Zhou and Heming Zhao, “Speech Signal Compressed sensing based on K-SVD adaptive dictionary”, Journal of Theoretical and Applied Information Technology, 2013.