SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016
ISSN :2394-2231 http://www.ijctjournal.org Page 189
A Detailed Analysis of Lossless Image Compression Techniques
Palwinder Singh*
*Assistant Professor, Department of Computer Science,GNDU, Amritsar
----------------------------------------************************----------------------------------
Abstract:
An image in its original form contains large amount of redundant data which consumes huge
amount of memory and can also create storage and transmission problem. The rapid growth in the field of
multimedia and digital images also needs more storage and more bandwidth while data transmission. By
reducing redundant bits within the image data the size of image can also be reduced without affecting
essential data. In this paper we are representing existing lossless image compression techniques. The
image quality will also be discussed on the basis of certain performance parameters such as compression
ratio, peak signal to noise ratio, root mean square.
Keywords — Image Compression, lossless Compression, Huffman Coding, Run Length Encoding,
LZW, Redundancy.
----------------------------------------************************----------------------------------
I. INTRODUCTION
A digital image is basically a 2-Dimensional array
of pixels. Images from the significant part of data,
particularly in remote sensing, biomedical and
video conferencing applications are types of digital
images. An image is essentially a 2-D signal
processed by the human visual system. The signals
representing images are usually in analog form.
However, for processing, storage and transmission
by computer applications, they are converted from
analog to digital form. A digital image is basically a
2-Dimensional array of pixels. With growth of
technology dependence on information technology
and computers rapidly growing, so need for
efficient ways of storing and transmitting large
amounts of data also growing [1]. The Prime need
of Image Compression is to reduce the size the
image for storage purpose Lossy methods are
particularly suitable for expected images such as
photographs in applications where negligible
thrashing of commitment is tolerable to accomplish
a generous lessening in bit rate. The lossy
compression that produces unnoticeable differences
may be called visually lossless. Image compression
is a procedure that deals with tumbling the quantity
of data mandatory to symbolize a digital image by
removing the superfluous data. It is been used to
curtail the size in bytes of a graphics file exclusive
of corrupting the excellence of the image to an
undesirable intensity. The lessening in file
dimension allows supplementary images to be
stored in a specified quantity of diskette or
recollection space. Image Compression also reduce
the redundancy, extra information, & to transform
data in efficient manner. There is the need of short
data because it reduces the transmission and storage
cost.
II. IMAGE COMPRESSION AND TYPES
Image compression addresses the problem of
reducing the amount of data required to represent a
digital image [2]. It is a process intended to yield a
compact representation of an image, thereby
reducing the image storage/transmission
requirements. Compression is achieved by the
removal of one or more of the three basic data
redundancies:
• Coding Redundancy
• Interpixel Redundancy
• Psychovisual redundancy
RESEARCH ARTICLE OPEN ACCESS
International Journal of Computer Techniques
ISSN: 2394-2231
Coding redundancy is present when less than
optimal code words are used. Interpixel redundancy
results from correlations between the pixels of an
image. Psychovisual redundancy is due to data that
is ignored by the human visual system (i.e. visually
non essential information). The objective of image
compression is to reduce the number of bits. It
needs to represent an image by removing the
Spatial and Spectral redundancies as
possible, while keeping the resolution and visual
quality of the reconstructed image as close to the
original image by taking advantage of these
redundancies [3]. An inverse process
decompression is applied to the compressed data to
get the reconstructed image.
Fig.1 Image Compression and Decompression
Image Compression is possible because most of the
real world data is very redundant. Image
Compression is basically defined as a technique that
reduces the size of data by applying different
methods that can either be Lossy or Lossless. A
compression program is used to convert image from
an easy-to-use format to one optimized fo
compactness. Two basic classes of image
compression are applied in different areas [4
of these is lossy image compression, which is
widely used to compress image data files for
communication or archives purposes. The other is
lossless image compression that is commonly used
to transmit or archive text or binary files required to
keep their information intact at any time.
Fig. 2 Classification of Data Compression
Decompression
Compression
Mapper Quantizer Encoder
Inverse
Mapper
Dequantizer Decoder
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016
2231 http://www.ijctjournal.org
Coding redundancy is present when less than
optimal code words are used. Interpixel redundancy
results from correlations between the pixels of an
image. Psychovisual redundancy is due to data that
the human visual system (i.e. visually
information). The objective of image
reduce the number of bits. It
by removing the
Spatial and Spectral redundancies as much as
possible, while keeping the resolution and visual
structed image as close to the
image by taking advantage of these
inverse process called
applied to the compressed data to
Image Compression is possible because most of the
redundant. Image
Compression is basically defined as a technique that
reduces the size of data by applying different
methods that can either be Lossy or Lossless. A
compression program is used to convert image from
use format to one optimized for
compactness. Two basic classes of image
re applied in different areas [4]. One
of these is lossy image compression, which is
widely used to compress image data files for
communication or archives purposes. The other is
sion that is commonly used
to transmit or archive text or binary files required to
keep their information intact at any time.
III. BENEFITS OF LOSSLESS
A. Storage Space
Compressing data files allows one
files in the storage space that is available. Lossless
compression, used in zip file technology, will
typically reduce a file to 50 percent of its original
size. However, difference in the file size is not seen
if the zip files are already in a
such as MP3 audio files or PDF
Document Format) text-only files [5
B. Transfer Speed
The download process uses network bandwidth
whenever we download a file, such as an MP3
audio file, from a server on the Internet. Bandwid
is defined as the speed at which the network
transfers data and is measured in Mbps (megabits
per second). Compressed files contain fewer "bits"
of data than uncompressed
consequence, use less bandwidth when
download them. This means that the transfer speed,
that is the time it takes to download a file, is
quicker. It will take 10 seconds to download a file if
bandwidth of 1Mbps is available, and for
downloading a file that is 10Mb (megabits) in size,
it will only take 5 seconds to do
the file is compressed to 5Mb [6
C. Cost
The costs of storing the data are reduced by
compressing the files for storage because more files
Image compression
Lossy Image
compression
Encoder
Decoder
Apr 2016
Page 190
ESS COMPRESSION
Compressing data files allows one to store more
the storage space that is available. Lossless
used in zip file technology, will
50 percent of its original
size. However, difference in the file size is not seen
compressed format,
such as MP3 audio files or PDF (Portable
only files [5].
The download process uses network bandwidth
whenever we download a file, such as an MP3
from a server on the Internet. Bandwidth
the speed at which the network
measured in Mbps (megabits
files contain fewer "bits"
files, and, as a
consequence, use less bandwidth when we
that the transfer speed,
that is the time it takes to download a file, is
will take 10 seconds to download a file if
1Mbps is available, and for
10Mb (megabits) in size,
download the file if
the file is compressed to 5Mb [6].
The costs of storing the data are reduced by
the files for storage because more files
Image compression
Lossless Image
Compression
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 191
can be stored in available storage space when they
are compressed. We will need to buy a second
250MB drive if we have 500MB (megabytes) of
uncompressed data and a 250MB hard drive on
which to store it. You will not need to buy the extra
hard drive if you compress the data files to 50
percent of their uncompressed size [6].
D. Accuracy
It also reduces chance of transmission errors
because as we reduce data redundancy which
increases consistency and decreases chance of error.
Moreover by compressing very fewer bits are
transferred.
IV. LOSSLESS COMPRESSION TECHNIQUES
Lossless data compression is a technique that which
allows the use of data compression algorithms to
compress the data file and also allows the exact
original data to be reconstructed from the
compressed data. This is in contrast to the lossy
data compression in which the original data cannot
be restored from the compressed data. The popular
ZIP file format that is being used for the
compression of data files is also an application of
lossless data compression approach. Lossless text
data compression algorithms usually exploit
statistical redundancy in such a way so as to
represent the sender's data more concisely without
any error or any sort of loss of important
information contained within the text input data [7].
A. LZW Coding
LZW (Lempel-Ziv–Welch) is a totally dictionary
based coding. Lzw encoding is further divided into
static & dynamic. In static, dictionary is fixed
during the encoding and decoding processes. In
dynamic dictionary coding, the dictionary is
updated if needed. LZW compression replaces
strings of characters with single codes. It does not
perform any analysis of the incoming text. Instead,
it just adds every new string of characters from the
table of strings [8]. The code that the LZW
algorithm outputs can be of any arbitrary length, but
it must have more bits in it than a single character.
LZW compression works best for files containing
lots of repetitive data. LZW compression maintains
a dictionary. In this dictionary all the stream entry
and code are stored.
Fig.3 Example of LZW Coding
Basic steps of LZW coding are given below.
• Input the data stream
• Initialize the dictionary to contain entry of each
character of stream.
• Read the stream if current byte is the end of
stream, then exits.
• Otherwise read next character and produce a
new code. If the bunch of character is frequently
occurring then give them a unique code
(according to the diagram)
• Read next input character of stream from
dictionary
If there is no such pattern of stream in
dictionary,then
a) Add new string to the dictionary
b) Write the new code for new entered string.
c) Go to step 4.
• Write out code for encoded string and exit.
B. Huffman coding
Huffman coding deals with data compression that
follows top down approach means the binary tree is
built from the top down to generate an optimal
result. In Huffman Coding the characters in a data
file are converted to binary code and the most
common characters in the file have the shortest
binary codes, and the characters which are least
common have the longest binary code [9]. Every
node contains the relative probability of occurrence
of the characters belonging to the sub tree beneath
the node. The edges are labelled with the bits 0 and
1. The algorithm to generate Huffman code is:
• Parse the input and count the occurrence of each
symbol.
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 192
• Determine the probability of occurrence of each
symbol using the symbol count.
• Sort the symbols according to their probability
of occurrence, with the most probable first.
• Then generate leaf nodes for each symbol and
add them to a queue.
• Take two least frequent characters and then
logically group them together to obtain their
combined frequency that leads to the
construction of a binary tree structure.
• Repeat step 5 until all elements are reached and
there remains only one parent for all nodes
which is known as root.
• Then label the edges from each parent to its left
child with the digit 0 and the edge to right child
with 1. Tracing down the tree yields to
“Huffman codes” in which shortest codes are
assigned to the character with greater frequency.
C. Lossless JPEG
Lossless JPEG was developed as a late addition to
JPEG in 1993, using a completely different
technique from the lossy JPEG standard. It can
perform lossless compression as long as the image
size is a multiple of MCU (Minimum Coded Limit).
It uses a predictive scheme based on the three
nearest neighbors upper, left and upper-left and
entropy coding is used on the prediction error. It
uses a simple predictive algorithm and Huffman
algorithm to encode the prediction difference. This
technique is rarely used since its compression ratio
is very low when compared to Lossy modes. This
technique is very useful in the case of medical
image compression where the loss of information is
not tolerable [10]. The main steps of lossless
operation mode are depicted in Fig.4.
Fig.4 Lossless JPEG Compression
D. FELICs
FELICS is the compression that runs very fast with
only minimal loss of compression efficiency. We
call this technique FELICS, for Fast, Efficient,
Lossless Image Compression System. It use raster-
scan order, and we use a pixel's two nearest
neighbors to directly obtain an approximate
probability distribution for its intensity, in effective
combining the prediction and error modeling steps.
It use a novel technique to select the closest of a set
of error models, each corresponding to a simple
prefix code. Finally It encode the intensity using the
selected prefix code. The resulting compressor runs
about five times as fast as an implementation of the
lossless mode of the JPEG proposed standard while
obtaining slightly better compression on many
images [11]. By using an appropriate pixel
sequence we can obtain a progressive encoding, and
by using sophisticated prediction and error
modeling techniques in conjunction with arithmetic
coding It can obtain state-of-the-art compression
efficiency.
E. Wavelet Transform Based Compression
The DCT based JPEG image compression will not
have a significant effect on geometry by using
Blocking artifacts" and the edge effects are
produced under the large compression ratio. A good
solution to this problem is the use of "wavelet". So
from the last two decades for "image Analysis and
coding", DWT has become an important tool [12].
Source Image
Data
Predictor
Entropy Encoder
Lossless
Encoder
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 193
• Integer Wavelet Transform
The main drawback of the DWT is that the wavelet
coefficients are real numbers. In this case efficient
lossless coding is not possible using linear
transforms. The lifting scheme (LS) presented by
Sweldens allows an efficient implementation of the
DWT. Another of its properties is that perfect
reconstruction is ensured by the structure of the LS
itself. This allows new transformations to be used.
One such transformation is the integer wavelet
transform (IWT) [12] it is a basic modification of
linear transforms, where each filter output is
rounded to the nearest integer. IWT can be used to
have a unified lossy and lossless codec. It is also of
interest for hardware implementations, where the
use of floating point is still a costly operation.
The wavelet Lifting Scheme is a method for
decomposing wavelet transforms into a set of
stages. The convolution-based 1-D DWT requires
both a large number of arithmetic computations and
a large memory for storage. Such features are not
desirable for either high speed or low power image
processing applications. The main feature of the
lifting-based wavelet transform is to break-up the
high pass and the low pass wavelet filters into a
sequence of smaller filters. The lifting scheme
requires fewer computations compared to the
convolution-based DWT. Therefore the
computational complexity is reduced to almost a
half of those needed with a convolution approach.
The main advantages of lifting scheme are as
follows:
• It allows a faster implementation of the wavelet
transforms.
• The lifting scheme allows a fully in-place
calculation of the wavelet transform. In other
words, no auxiliary memory is needed and the
original signal (image) can be replaced with its
wavelet transform.
• With the lifting scheme, the inverse wavelet
transform can immediately be found by undoing
the operations of the forward transform. In
practice, this comes down to simply reversing
the order of the operations and changing each +
into a - and vice versa.
Because of the superior energy compaction
properties and correspondence with human visual
system, wavelet compression methods have
produced superior objective and subjective results.
Since wavelet basis consists of functions with both
short support (for high frequencies) and long
support (for low frequencies), large smooth areas of
an image may be represented with very few bits,
and details are added where it is needed.
V. CONCLUSIONS
Here different lossless Image Compression
Techniques are discussed. Image Compression
plays a significant role in reducing the transmission
and storage cost. All the image compression
techniques are useful in their related areas and
every day new compression technique is developing
which gives better compression ratio. In Lossless
compression, the image is compressed and
decompressed without any lose of information.
Now a day a wavelet Lossless image Compression
Technique is used and Integer Wavelet Transform
is giving better compression ratio as like lossy
compression without compromising the quality of
image. Based on Different Technology conclude
that the quality of the image can be measured by the
important factor as like peak signal to noise ratio
and mean square error and Compression ratio.
REFERENCES
[1] S. Porwal, Y. Chaudhary, J. Joshi and M. Jain , “ Data Compression
Methodologies for Lossless Data and Comparison between Algorithms”
International Journal of Engineering Science and Innovative
Technology (IJESIT) Volume 2, Issue 2, March 2013
[2] S. Shanmugasundaram and R. Lourdusamy, “A Comparative Study of
Text Compression Algorithms” International Journal of Wisdom Based
Computing, Vol. 1 (3), December 2011.
[3] Bhammar M.B,. Mehta K.”A survey of various image compression
techniques” IJDI-ERET- International Journal Of Darashan Institute
On Engineering Research & Emerging Technology Vol. 1, No. 1, 2012.
[4] R.S. Brar and B.Singh, “A survey on different compression techniques
and bit reduction algorithm for compression of text data” International
Journal of Advanced Research in Computer Science and Software
Engineering (IJARCSSE ) Volume 3, Issue 3, March 2013
[5] A. Singh and Y. Bhatnagar, “ Enhancement of data compression using
Incremental Encoding” International Journal of Scientific &
Engineering Research, Volume 3, Issue 5, May-2012.
[6] Jpeg - 2000 compression available at
http://www.prepressure.com/library/compressionalgorithm/jpeg-2000
[7] Khobragade.P.B Thakare.S.S “Image compression techniques A
Review” International Journal of computer science and information
technologies Vol 5(1) 2014
International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016
ISSN: 2394-2231 http://www.ijctjournal.org Page 194
[8] Kashyap N.and Singh S.N “Review of images compression and
compression of its algorithms” International Journal of Application or
Innovation in Engineering & Management (IJAIEM) Volume 2, Issue
12, December 2013.
[9] B. Ranjan, “Information Theory, Coding and Cryptogra-phy,” 2nd
Edition, McGraw-Hill Book Company, India, 2008.
[10] J. H. Pujar and L. M. Kadlaskar, “A New Lossless Me-thod of Image
Compression and Decompression Using Huffman Coding Technique,”
Journal of Theoretical and Applied Information Technology, Vol. 15,
No. 1, 2010.
[11] B. Meyer and P. Tischer, “TMW—A New Method for Lossless Image
Compression,” Australia, 1997.
[12] Subramanya A. “Image Compression Technique,” potentials IEEE, Vol.
20, issue 1, pp19-23, Feb-March 2001.

More Related Content

Viewers also liked

Viewers also liked (19)

[IJCT V3I2P33] Authors: Karandeep Kaur
[IJCT V3I2P33] Authors: Karandeep Kaur[IJCT V3I2P33] Authors: Karandeep Kaur
[IJCT V3I2P33] Authors: Karandeep Kaur
 
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
 
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
[IJET-V2I1P2] Authors: S. Lakshmi Prabha1, A.R.Mohamed Shanavas
 
[IJET-V2I3P22] Authors: Harsha Pakhale,Deepak Kumar Xaxa
[IJET-V2I3P22] Authors: Harsha Pakhale,Deepak Kumar Xaxa[IJET-V2I3P22] Authors: Harsha Pakhale,Deepak Kumar Xaxa
[IJET-V2I3P22] Authors: Harsha Pakhale,Deepak Kumar Xaxa
 
[IJET-V2I3P21] Authors: Amit Kumar Dewangan, Akhilesh Kumar Shrivas, Prem Kumar
[IJET-V2I3P21] Authors: Amit Kumar Dewangan, Akhilesh Kumar Shrivas, Prem Kumar[IJET-V2I3P21] Authors: Amit Kumar Dewangan, Akhilesh Kumar Shrivas, Prem Kumar
[IJET-V2I3P21] Authors: Amit Kumar Dewangan, Akhilesh Kumar Shrivas, Prem Kumar
 
[IJCT-V3I2P20] Authors: Gidijala Sai Kumar,Gadiraju Mounika , Dusi Leela Ran...
[IJCT-V3I2P20] Authors: Gidijala Sai Kumar,Gadiraju Mounika  , Dusi Leela Ran...[IJCT-V3I2P20] Authors: Gidijala Sai Kumar,Gadiraju Mounika  , Dusi Leela Ran...
[IJCT-V3I2P20] Authors: Gidijala Sai Kumar,Gadiraju Mounika , Dusi Leela Ran...
 
[IJET-V2I1P9] Authors:Wasim B. Patel,Ritesh G. Deokar,Pundlik N. Patil,Raghun...
[IJET-V2I1P9] Authors:Wasim B. Patel,Ritesh G. Deokar,Pundlik N. Patil,Raghun...[IJET-V2I1P9] Authors:Wasim B. Patel,Ritesh G. Deokar,Pundlik N. Patil,Raghun...
[IJET-V2I1P9] Authors:Wasim B. Patel,Ritesh G. Deokar,Pundlik N. Patil,Raghun...
 
[IJET-V2I2P16] Authors: Jariwala Hiren, Patel Chintan, Prasad Kuldip, Shukla ...
[IJET-V2I2P16] Authors: Jariwala Hiren, Patel Chintan, Prasad Kuldip, Shukla ...[IJET-V2I2P16] Authors: Jariwala Hiren, Patel Chintan, Prasad Kuldip, Shukla ...
[IJET-V2I2P16] Authors: Jariwala Hiren, Patel Chintan, Prasad Kuldip, Shukla ...
 
[IJET-V1I4P7] Authors :Su Mon Myint
[IJET-V1I4P7] Authors :Su Mon Myint[IJET-V1I4P7] Authors :Su Mon Myint
[IJET-V1I4P7] Authors :Su Mon Myint
 
[IJET-V1I6P18] Authors : Wasim B. Patel , Pundlik N. Patil , Raghunath Y. Pat...
[IJET-V1I6P18] Authors : Wasim B. Patel , Pundlik N. Patil , Raghunath Y. Pat...[IJET-V1I6P18] Authors : Wasim B. Patel , Pundlik N. Patil , Raghunath Y. Pat...
[IJET-V1I6P18] Authors : Wasim B. Patel , Pundlik N. Patil , Raghunath Y. Pat...
 
[IJET-V2I1P6] Authors:
[IJET-V2I1P6] Authors:[IJET-V2I1P6] Authors:
[IJET-V2I1P6] Authors:
 
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
 
[IJET-V2I2P8] Authors:Ms. Madhushree M.Kubsad
[IJET-V2I2P8] Authors:Ms. Madhushree M.Kubsad[IJET-V2I2P8] Authors:Ms. Madhushree M.Kubsad
[IJET-V2I2P8] Authors:Ms. Madhushree M.Kubsad
 
[IJET-V1I6P17] Authors : Mrs.R.Kalpana, Mrs.P.Padmapriya
[IJET-V1I6P17] Authors : Mrs.R.Kalpana, Mrs.P.Padmapriya[IJET-V1I6P17] Authors : Mrs.R.Kalpana, Mrs.P.Padmapriya
[IJET-V1I6P17] Authors : Mrs.R.Kalpana, Mrs.P.Padmapriya
 
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
[IJET V2I3P14] Authors: S.Renuka Devi, A.C. Sumathi
 
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
[IJET-V1I6P15] Authors : Sadhana Raut, Poonam Rohani,Sumera Shaikh, Tehesin S...
 
[IJET V2I3P5] Authors: Jamuna H G, Shobha Hugar
[IJET V2I3P5] Authors: Jamuna H G, Shobha Hugar[IJET V2I3P5] Authors: Jamuna H G, Shobha Hugar
[IJET V2I3P5] Authors: Jamuna H G, Shobha Hugar
 
[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R
[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R
[IJET-V2I1P7] Authors:Puneeth Rao R1, Aravind Rao R
 
[IJET-V2I2P12] Authors:Ashok Kumar
[IJET-V2I2P12] Authors:Ashok Kumar[IJET-V2I2P12] Authors:Ashok Kumar
[IJET-V2I2P12] Authors:Ashok Kumar
 

Similar to [IJCT-V3I2P27] Authors: Palwinder Singh

Enhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsEnhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsIJRES Journal
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compressionPradip Kumar
 
Image Processing in Android Environment AJCSE
Image Processing in Android Environment AJCSEImage Processing in Android Environment AJCSE
Image Processing in Android Environment AJCSEBRNSSPublicationHubI
 
IMAGE COMPRESSION AND DECOMPRESSION SYSTEM
IMAGE COMPRESSION AND DECOMPRESSION SYSTEMIMAGE COMPRESSION AND DECOMPRESSION SYSTEM
IMAGE COMPRESSION AND DECOMPRESSION SYSTEMVishesh Banga
 
R Ramya devi digital image processing
R  Ramya devi digital image processingR  Ramya devi digital image processing
R Ramya devi digital image processingPriyadharshiniVS
 
Affable Compression through Lossless Column-Oriented Huffman Coding Technique
Affable Compression through Lossless Column-Oriented Huffman Coding TechniqueAffable Compression through Lossless Column-Oriented Huffman Coding Technique
Affable Compression through Lossless Column-Oriented Huffman Coding TechniqueIOSR Journals
 
Video compression
Video compressionVideo compression
Video compressionDeepa K C
 
Mobile Device Oriented Image Scaling for Reducing Memory Consumption in stor...
Mobile Device Oriented Image Scaling for Reducing  Memory Consumption in stor...Mobile Device Oriented Image Scaling for Reducing  Memory Consumption in stor...
Mobile Device Oriented Image Scaling for Reducing Memory Consumption in stor...Editor IJCATR
 
Image compression using discrete cosine transform
Image compression using discrete cosine transformImage compression using discrete cosine transform
Image compression using discrete cosine transformmanoj kumar
 
Mastering and Compressing Image Size.pdf
Mastering and Compressing Image Size.pdfMastering and Compressing Image Size.pdf
Mastering and Compressing Image Size.pdfWilliam Thomas
 
Cuda Based Performance Evaluation Of The Computational Efficiency Of The Dct ...
Cuda Based Performance Evaluation Of The Computational Efficiency Of The Dct ...Cuda Based Performance Evaluation Of The Computational Efficiency Of The Dct ...
Cuda Based Performance Evaluation Of The Computational Efficiency Of The Dct ...acijjournal
 
Reduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed ImageReduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed ImageDr Sukhpal Singh Gill
 
Implementation of Brain Tumor Extraction Application from MRI Image
Implementation of Brain Tumor Extraction Application from MRI ImageImplementation of Brain Tumor Extraction Application from MRI Image
Implementation of Brain Tumor Extraction Application from MRI Imageijtsrd
 
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...PriyaU5
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationIJERA Editor
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationIJERA Editor
 
Hybrid Algorithm for Enhancing and Increasing Image Compression Based on Imag...
Hybrid Algorithm for Enhancing and Increasing Image Compression Based on Imag...Hybrid Algorithm for Enhancing and Increasing Image Compression Based on Imag...
Hybrid Algorithm for Enhancing and Increasing Image Compression Based on Imag...IJCSIS Research Publications
 

Similar to [IJCT-V3I2P27] Authors: Palwinder Singh (20)

Enhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsEnhanced Image Compression Using Wavelets
Enhanced Image Compression Using Wavelets
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compression
 
Image Processing in Android Environment AJCSE
Image Processing in Android Environment AJCSEImage Processing in Android Environment AJCSE
Image Processing in Android Environment AJCSE
 
IMAGE COMPRESSION AND DECOMPRESSION SYSTEM
IMAGE COMPRESSION AND DECOMPRESSION SYSTEMIMAGE COMPRESSION AND DECOMPRESSION SYSTEM
IMAGE COMPRESSION AND DECOMPRESSION SYSTEM
 
R Ramya devi digital image processing
R  Ramya devi digital image processingR  Ramya devi digital image processing
R Ramya devi digital image processing
 
Affable Compression through Lossless Column-Oriented Huffman Coding Technique
Affable Compression through Lossless Column-Oriented Huffman Coding TechniqueAffable Compression through Lossless Column-Oriented Huffman Coding Technique
Affable Compression through Lossless Column-Oriented Huffman Coding Technique
 
Video compression
Video compressionVideo compression
Video compression
 
Mobile Device Oriented Image Scaling for Reducing Memory Consumption in stor...
Mobile Device Oriented Image Scaling for Reducing  Memory Consumption in stor...Mobile Device Oriented Image Scaling for Reducing  Memory Consumption in stor...
Mobile Device Oriented Image Scaling for Reducing Memory Consumption in stor...
 
Pbl1
Pbl1Pbl1
Pbl1
 
Multimedia:Multimedia compression
Multimedia:Multimedia compression Multimedia:Multimedia compression
Multimedia:Multimedia compression
 
Image compression using discrete cosine transform
Image compression using discrete cosine transformImage compression using discrete cosine transform
Image compression using discrete cosine transform
 
Mastering and Compressing Image Size.pdf
Mastering and Compressing Image Size.pdfMastering and Compressing Image Size.pdf
Mastering and Compressing Image Size.pdf
 
Cuda Based Performance Evaluation Of The Computational Efficiency Of The Dct ...
Cuda Based Performance Evaluation Of The Computational Efficiency Of The Dct ...Cuda Based Performance Evaluation Of The Computational Efficiency Of The Dct ...
Cuda Based Performance Evaluation Of The Computational Efficiency Of The Dct ...
 
Reduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed ImageReduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed Image
 
Implementation of Brain Tumor Extraction Application from MRI Image
Implementation of Brain Tumor Extraction Application from MRI ImageImplementation of Brain Tumor Extraction Application from MRI Image
Implementation of Brain Tumor Extraction Application from MRI Image
 
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
Dr.U.Priya, Head & Assistant Professor of Commerce, Bon Secours for Women, Th...
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
 
Sub1584
Sub1584Sub1584
Sub1584
 
Hybrid Algorithm for Enhancing and Increasing Image Compression Based on Imag...
Hybrid Algorithm for Enhancing and Increasing Image Compression Based on Imag...Hybrid Algorithm for Enhancing and Increasing Image Compression Based on Imag...
Hybrid Algorithm for Enhancing and Increasing Image Compression Based on Imag...
 

More from IJET - International Journal of Engineering and Techniques

More from IJET - International Journal of Engineering and Techniques (20)

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p18
 
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p17
 
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p16
 
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p15
 
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p14
 
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p13
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p11
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
Ijet v5 i6p2
 
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P24
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P22
 
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P21
 
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P20
 
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P19
 
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P18
 
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17
IJET-V3I2P17
 

Recently uploaded

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

[IJCT-V3I2P27] Authors: Palwinder Singh

  • 1. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016 ISSN :2394-2231 http://www.ijctjournal.org Page 189 A Detailed Analysis of Lossless Image Compression Techniques Palwinder Singh* *Assistant Professor, Department of Computer Science,GNDU, Amritsar ----------------------------------------************************---------------------------------- Abstract: An image in its original form contains large amount of redundant data which consumes huge amount of memory and can also create storage and transmission problem. The rapid growth in the field of multimedia and digital images also needs more storage and more bandwidth while data transmission. By reducing redundant bits within the image data the size of image can also be reduced without affecting essential data. In this paper we are representing existing lossless image compression techniques. The image quality will also be discussed on the basis of certain performance parameters such as compression ratio, peak signal to noise ratio, root mean square. Keywords — Image Compression, lossless Compression, Huffman Coding, Run Length Encoding, LZW, Redundancy. ----------------------------------------************************---------------------------------- I. INTRODUCTION A digital image is basically a 2-Dimensional array of pixels. Images from the significant part of data, particularly in remote sensing, biomedical and video conferencing applications are types of digital images. An image is essentially a 2-D signal processed by the human visual system. The signals representing images are usually in analog form. However, for processing, storage and transmission by computer applications, they are converted from analog to digital form. A digital image is basically a 2-Dimensional array of pixels. With growth of technology dependence on information technology and computers rapidly growing, so need for efficient ways of storing and transmitting large amounts of data also growing [1]. The Prime need of Image Compression is to reduce the size the image for storage purpose Lossy methods are particularly suitable for expected images such as photographs in applications where negligible thrashing of commitment is tolerable to accomplish a generous lessening in bit rate. The lossy compression that produces unnoticeable differences may be called visually lossless. Image compression is a procedure that deals with tumbling the quantity of data mandatory to symbolize a digital image by removing the superfluous data. It is been used to curtail the size in bytes of a graphics file exclusive of corrupting the excellence of the image to an undesirable intensity. The lessening in file dimension allows supplementary images to be stored in a specified quantity of diskette or recollection space. Image Compression also reduce the redundancy, extra information, & to transform data in efficient manner. There is the need of short data because it reduces the transmission and storage cost. II. IMAGE COMPRESSION AND TYPES Image compression addresses the problem of reducing the amount of data required to represent a digital image [2]. It is a process intended to yield a compact representation of an image, thereby reducing the image storage/transmission requirements. Compression is achieved by the removal of one or more of the three basic data redundancies: • Coding Redundancy • Interpixel Redundancy • Psychovisual redundancy RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Computer Techniques ISSN: 2394-2231 Coding redundancy is present when less than optimal code words are used. Interpixel redundancy results from correlations between the pixels of an image. Psychovisual redundancy is due to data that is ignored by the human visual system (i.e. visually non essential information). The objective of image compression is to reduce the number of bits. It needs to represent an image by removing the Spatial and Spectral redundancies as possible, while keeping the resolution and visual quality of the reconstructed image as close to the original image by taking advantage of these redundancies [3]. An inverse process decompression is applied to the compressed data to get the reconstructed image. Fig.1 Image Compression and Decompression Image Compression is possible because most of the real world data is very redundant. Image Compression is basically defined as a technique that reduces the size of data by applying different methods that can either be Lossy or Lossless. A compression program is used to convert image from an easy-to-use format to one optimized fo compactness. Two basic classes of image compression are applied in different areas [4 of these is lossy image compression, which is widely used to compress image data files for communication or archives purposes. The other is lossless image compression that is commonly used to transmit or archive text or binary files required to keep their information intact at any time. Fig. 2 Classification of Data Compression Decompression Compression Mapper Quantizer Encoder Inverse Mapper Dequantizer Decoder International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016 2231 http://www.ijctjournal.org Coding redundancy is present when less than optimal code words are used. Interpixel redundancy results from correlations between the pixels of an image. Psychovisual redundancy is due to data that the human visual system (i.e. visually information). The objective of image reduce the number of bits. It by removing the Spatial and Spectral redundancies as much as possible, while keeping the resolution and visual structed image as close to the image by taking advantage of these inverse process called applied to the compressed data to Image Compression is possible because most of the redundant. Image Compression is basically defined as a technique that reduces the size of data by applying different methods that can either be Lossy or Lossless. A compression program is used to convert image from use format to one optimized for compactness. Two basic classes of image re applied in different areas [4]. One of these is lossy image compression, which is widely used to compress image data files for communication or archives purposes. The other is sion that is commonly used to transmit or archive text or binary files required to keep their information intact at any time. III. BENEFITS OF LOSSLESS A. Storage Space Compressing data files allows one files in the storage space that is available. Lossless compression, used in zip file technology, will typically reduce a file to 50 percent of its original size. However, difference in the file size is not seen if the zip files are already in a such as MP3 audio files or PDF Document Format) text-only files [5 B. Transfer Speed The download process uses network bandwidth whenever we download a file, such as an MP3 audio file, from a server on the Internet. Bandwid is defined as the speed at which the network transfers data and is measured in Mbps (megabits per second). Compressed files contain fewer "bits" of data than uncompressed consequence, use less bandwidth when download them. This means that the transfer speed, that is the time it takes to download a file, is quicker. It will take 10 seconds to download a file if bandwidth of 1Mbps is available, and for downloading a file that is 10Mb (megabits) in size, it will only take 5 seconds to do the file is compressed to 5Mb [6 C. Cost The costs of storing the data are reduced by compressing the files for storage because more files Image compression Lossy Image compression Encoder Decoder Apr 2016 Page 190 ESS COMPRESSION Compressing data files allows one to store more the storage space that is available. Lossless used in zip file technology, will 50 percent of its original size. However, difference in the file size is not seen compressed format, such as MP3 audio files or PDF (Portable only files [5]. The download process uses network bandwidth whenever we download a file, such as an MP3 from a server on the Internet. Bandwidth the speed at which the network measured in Mbps (megabits files contain fewer "bits" files, and, as a consequence, use less bandwidth when we that the transfer speed, that is the time it takes to download a file, is will take 10 seconds to download a file if 1Mbps is available, and for 10Mb (megabits) in size, download the file if the file is compressed to 5Mb [6]. The costs of storing the data are reduced by the files for storage because more files Image compression Lossless Image Compression
  • 3. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 191 can be stored in available storage space when they are compressed. We will need to buy a second 250MB drive if we have 500MB (megabytes) of uncompressed data and a 250MB hard drive on which to store it. You will not need to buy the extra hard drive if you compress the data files to 50 percent of their uncompressed size [6]. D. Accuracy It also reduces chance of transmission errors because as we reduce data redundancy which increases consistency and decreases chance of error. Moreover by compressing very fewer bits are transferred. IV. LOSSLESS COMPRESSION TECHNIQUES Lossless data compression is a technique that which allows the use of data compression algorithms to compress the data file and also allows the exact original data to be reconstructed from the compressed data. This is in contrast to the lossy data compression in which the original data cannot be restored from the compressed data. The popular ZIP file format that is being used for the compression of data files is also an application of lossless data compression approach. Lossless text data compression algorithms usually exploit statistical redundancy in such a way so as to represent the sender's data more concisely without any error or any sort of loss of important information contained within the text input data [7]. A. LZW Coding LZW (Lempel-Ziv–Welch) is a totally dictionary based coding. Lzw encoding is further divided into static & dynamic. In static, dictionary is fixed during the encoding and decoding processes. In dynamic dictionary coding, the dictionary is updated if needed. LZW compression replaces strings of characters with single codes. It does not perform any analysis of the incoming text. Instead, it just adds every new string of characters from the table of strings [8]. The code that the LZW algorithm outputs can be of any arbitrary length, but it must have more bits in it than a single character. LZW compression works best for files containing lots of repetitive data. LZW compression maintains a dictionary. In this dictionary all the stream entry and code are stored. Fig.3 Example of LZW Coding Basic steps of LZW coding are given below. • Input the data stream • Initialize the dictionary to contain entry of each character of stream. • Read the stream if current byte is the end of stream, then exits. • Otherwise read next character and produce a new code. If the bunch of character is frequently occurring then give them a unique code (according to the diagram) • Read next input character of stream from dictionary If there is no such pattern of stream in dictionary,then a) Add new string to the dictionary b) Write the new code for new entered string. c) Go to step 4. • Write out code for encoded string and exit. B. Huffman coding Huffman coding deals with data compression that follows top down approach means the binary tree is built from the top down to generate an optimal result. In Huffman Coding the characters in a data file are converted to binary code and the most common characters in the file have the shortest binary codes, and the characters which are least common have the longest binary code [9]. Every node contains the relative probability of occurrence of the characters belonging to the sub tree beneath the node. The edges are labelled with the bits 0 and 1. The algorithm to generate Huffman code is: • Parse the input and count the occurrence of each symbol.
  • 4. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 192 • Determine the probability of occurrence of each symbol using the symbol count. • Sort the symbols according to their probability of occurrence, with the most probable first. • Then generate leaf nodes for each symbol and add them to a queue. • Take two least frequent characters and then logically group them together to obtain their combined frequency that leads to the construction of a binary tree structure. • Repeat step 5 until all elements are reached and there remains only one parent for all nodes which is known as root. • Then label the edges from each parent to its left child with the digit 0 and the edge to right child with 1. Tracing down the tree yields to “Huffman codes” in which shortest codes are assigned to the character with greater frequency. C. Lossless JPEG Lossless JPEG was developed as a late addition to JPEG in 1993, using a completely different technique from the lossy JPEG standard. It can perform lossless compression as long as the image size is a multiple of MCU (Minimum Coded Limit). It uses a predictive scheme based on the three nearest neighbors upper, left and upper-left and entropy coding is used on the prediction error. It uses a simple predictive algorithm and Huffman algorithm to encode the prediction difference. This technique is rarely used since its compression ratio is very low when compared to Lossy modes. This technique is very useful in the case of medical image compression where the loss of information is not tolerable [10]. The main steps of lossless operation mode are depicted in Fig.4. Fig.4 Lossless JPEG Compression D. FELICs FELICS is the compression that runs very fast with only minimal loss of compression efficiency. We call this technique FELICS, for Fast, Efficient, Lossless Image Compression System. It use raster- scan order, and we use a pixel's two nearest neighbors to directly obtain an approximate probability distribution for its intensity, in effective combining the prediction and error modeling steps. It use a novel technique to select the closest of a set of error models, each corresponding to a simple prefix code. Finally It encode the intensity using the selected prefix code. The resulting compressor runs about five times as fast as an implementation of the lossless mode of the JPEG proposed standard while obtaining slightly better compression on many images [11]. By using an appropriate pixel sequence we can obtain a progressive encoding, and by using sophisticated prediction and error modeling techniques in conjunction with arithmetic coding It can obtain state-of-the-art compression efficiency. E. Wavelet Transform Based Compression The DCT based JPEG image compression will not have a significant effect on geometry by using Blocking artifacts" and the edge effects are produced under the large compression ratio. A good solution to this problem is the use of "wavelet". So from the last two decades for "image Analysis and coding", DWT has become an important tool [12]. Source Image Data Predictor Entropy Encoder Lossless Encoder
  • 5. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 193 • Integer Wavelet Transform The main drawback of the DWT is that the wavelet coefficients are real numbers. In this case efficient lossless coding is not possible using linear transforms. The lifting scheme (LS) presented by Sweldens allows an efficient implementation of the DWT. Another of its properties is that perfect reconstruction is ensured by the structure of the LS itself. This allows new transformations to be used. One such transformation is the integer wavelet transform (IWT) [12] it is a basic modification of linear transforms, where each filter output is rounded to the nearest integer. IWT can be used to have a unified lossy and lossless codec. It is also of interest for hardware implementations, where the use of floating point is still a costly operation. The wavelet Lifting Scheme is a method for decomposing wavelet transforms into a set of stages. The convolution-based 1-D DWT requires both a large number of arithmetic computations and a large memory for storage. Such features are not desirable for either high speed or low power image processing applications. The main feature of the lifting-based wavelet transform is to break-up the high pass and the low pass wavelet filters into a sequence of smaller filters. The lifting scheme requires fewer computations compared to the convolution-based DWT. Therefore the computational complexity is reduced to almost a half of those needed with a convolution approach. The main advantages of lifting scheme are as follows: • It allows a faster implementation of the wavelet transforms. • The lifting scheme allows a fully in-place calculation of the wavelet transform. In other words, no auxiliary memory is needed and the original signal (image) can be replaced with its wavelet transform. • With the lifting scheme, the inverse wavelet transform can immediately be found by undoing the operations of the forward transform. In practice, this comes down to simply reversing the order of the operations and changing each + into a - and vice versa. Because of the superior energy compaction properties and correspondence with human visual system, wavelet compression methods have produced superior objective and subjective results. Since wavelet basis consists of functions with both short support (for high frequencies) and long support (for low frequencies), large smooth areas of an image may be represented with very few bits, and details are added where it is needed. V. CONCLUSIONS Here different lossless Image Compression Techniques are discussed. Image Compression plays a significant role in reducing the transmission and storage cost. All the image compression techniques are useful in their related areas and every day new compression technique is developing which gives better compression ratio. In Lossless compression, the image is compressed and decompressed without any lose of information. Now a day a wavelet Lossless image Compression Technique is used and Integer Wavelet Transform is giving better compression ratio as like lossy compression without compromising the quality of image. Based on Different Technology conclude that the quality of the image can be measured by the important factor as like peak signal to noise ratio and mean square error and Compression ratio. REFERENCES [1] S. Porwal, Y. Chaudhary, J. Joshi and M. Jain , “ Data Compression Methodologies for Lossless Data and Comparison between Algorithms” International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 2, March 2013 [2] S. Shanmugasundaram and R. Lourdusamy, “A Comparative Study of Text Compression Algorithms” International Journal of Wisdom Based Computing, Vol. 1 (3), December 2011. [3] Bhammar M.B,. Mehta K.”A survey of various image compression techniques” IJDI-ERET- International Journal Of Darashan Institute On Engineering Research & Emerging Technology Vol. 1, No. 1, 2012. [4] R.S. Brar and B.Singh, “A survey on different compression techniques and bit reduction algorithm for compression of text data” International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE ) Volume 3, Issue 3, March 2013 [5] A. Singh and Y. Bhatnagar, “ Enhancement of data compression using Incremental Encoding” International Journal of Scientific & Engineering Research, Volume 3, Issue 5, May-2012. [6] Jpeg - 2000 compression available at http://www.prepressure.com/library/compressionalgorithm/jpeg-2000 [7] Khobragade.P.B Thakare.S.S “Image compression techniques A Review” International Journal of computer science and information technologies Vol 5(1) 2014
  • 6. International Journal of Computer Techniques -– Volume 3 Issue 2, Mar-Apr 2016 ISSN: 2394-2231 http://www.ijctjournal.org Page 194 [8] Kashyap N.and Singh S.N “Review of images compression and compression of its algorithms” International Journal of Application or Innovation in Engineering & Management (IJAIEM) Volume 2, Issue 12, December 2013. [9] B. Ranjan, “Information Theory, Coding and Cryptogra-phy,” 2nd Edition, McGraw-Hill Book Company, India, 2008. [10] J. H. Pujar and L. M. Kadlaskar, “A New Lossless Me-thod of Image Compression and Decompression Using Huffman Coding Technique,” Journal of Theoretical and Applied Information Technology, Vol. 15, No. 1, 2010. [11] B. Meyer and P. Tischer, “TMW—A New Method for Lossless Image Compression,” Australia, 1997. [12] Subramanya A. “Image Compression Technique,” potentials IEEE, Vol. 20, issue 1, pp19-23, Feb-March 2001.