SlideShare a Scribd company logo
1 of 7
Download to read offline
Advanced Computing: An International Journal (ACIJ), Vol.5, No.1, January 2014

SATELLITE IMAGE COMPRESSION TECHNIQUE
BASED ON THE EVIDENCE THEORY
Khaled Sahnoun, Noureddine Benabadji
Department of Physics, University of Sciences and Technology of Oran- Algeria
Laboratory of Analysis and Application of Radiation

ABSTRACT
Satellite image Compression reduces redundancy in data representation in order to achieve saving in the
cost of storage and transmission image compression compensates for the limited on-board resources, in
terms of mass memory and downlink bandwidth and thus it provides a solution to the (bandwidth vs. data
volume) dilemma of modern spacecraft Thus compression is very important feature in payload image
processing units of many satellites, In this paper, an improvement of the quantization step of the input
vectors has been proposed. The k-nearest neighbour (KNN) algorithm was used on each axis. The three
classifications considered as three independent sources of information, are combined in the framework of
the evidence theory the best code vector is then selected. After Huffman schemes is applied for encoding
and decoding.

KEYWORDS
Evidence theory, Vector quantization, k-nearest neighbour ,compression,

1. INTRODUCTION
The compression with vector quantization [1] accepts an input vector of dimension and
replaced by a vector of the same size belonging to a dictionary which is a finite set of code
also called classes, since they are calculated by an average iterative of
vectors
vectors
, the quantization step based on the nearest neighbor rule: vector
to classify is
assigned to one class of
under the condition that this assignment produces the
smallest distortion, Such assignment rule may be too drastic in cases where the distances between
the vector and other vector are very close a possible improvement to avoid this hard decision
would be to consider each color components independently to obtain a classification by
component, In this study, components (R,G,B) are considered as three independent information
sources, In a first phase, the K-nearest neighbor rule is applied to all three components (R,G,B)
then generating three sets of potential classes, This phase, taking into account K- neighbors and
not one, allows considering uncertainty according to each of color components and to push
decision making. The decision of the assignment final class of
is done after combining these
three classifications, This technique refers to methods of data fusion Among all the tools available
in this domain, we decide to use the evidence theory [2] which makes it possible to process
uncertain information and to combine information from several sources

DOI : 10.5121/acij.2014.5102

17
Advanced Computing: An International Journal (ACIJ), Vol.5, No.1, January 2014

2. USE THE EVIDENCE THEORY
2.1. Basic principle
Let
a set of all possible classes for corresponding to the dictionary in our
application. The evidence theory extends over the entire power of , noted , we define an
initial mass function of
in
which satisfies the following conditions
And

(1)

Where is the empty set
,
quantifies the belief that be given to the fact that the class
belongs to the subset of . Subsets like
are called focal elements. Two initial mass
functions (
) can be combined according to Dempster rule [3]

Is the conflict factor and represents the detuning between the two sources (
the combination of Dempster also called orthogonal sum and denoted

), Note that
,

After combination, a decision on the most likely element of must be taken. Several decision
rules are possible, we use the “maximum of Pignistic probability” Presented by Smets [4] which
uses the Pignistic transformation, and allows to evenly distributing the weight associated with a
subset of , on each of its elements

is called the Cardinal of
largest.

, The decision then goes to the element of , where this value is the

2.2. Application to the vector quantization
2.3. The quantization
We represent the information provided by each independent classification according to each of
the three 03components R, G, and B by a function of initial mass, These functions are created
after calculating the K-nearest neighbor (KNN) and before the final decision they allow to take
into account the uncertainty associated with each axis thus classes that are very close to each
other on the same axis are grouped in the same focal element and the decision is made after
having combined the results of the other projections for each axis identifies the most significant
elements “ ” by a distance
on this axis. The initial mass function constructed according to the
axis has three focal elements (
) is the complement of
. We construct

, Is the vector for classifying and the vector
its nearest neighbor depending on
, is a constant greater than 1 to take into account the sensitivity of the human visual system
according to the axis , if
then
is a singleton corresponding to the nearest
18
Advanced Computing: An International Journal (ACIJ), Vol.5, No.1, January 2014

neighbor, the masses are then assigned to the sets
taking into account the distribution of
elements in the set , the initial mass function for the axis is:

Is a constant and
.
is the maximal distance between vector
and of
elements in the (R,G,B) space, is the average distance between each elements of , More is
large more the mass of
is small.(
) The three functions of initial mass from
projections (R,G,B) respectively. Mass function resulting from the combination of this three
functions is obtained from equation (02):

The assignment class of the vector
Pignistic probability equation (03)

is selects from

equation (09), on the basis of maximum of

3. HUFFMAN COMPRESSION FOR (R,G,B)
The compression is achieved by compressing a range of values to a single quantum value, when
the given number of discrete symbols in a given stream is reduced the stream becomes more
compressible after the image is quantized, Huffman algorithm is applied. The Huffman has used a
variable-length code table for the encoding of each character of an image where the variablelength code table is derived from the estimated probability of occurrence for each possible value
of the source symbol, The Huffman coding has used a particular method for choosing the
representation for each symbol which has resulted in a prefix codes, These prefix codes expresses
the most common source symbols using shorter strings of bits than are used for less common
source symbols. In this step we have achieved a compressed image [5].

4 EXPERIMENTAL RESULTS AND DISCUSSION
Different color images have been taken for experimental purpose, simulation results for different
images are given in Table 01. For measuring the originality of the compressed image Peak Signal
to Noise Ratio PSNR is used, which is calculated using the formula (10)

Where MSE is the mean squared error between the original image
and the reconstructed
compressed image
of the size MN [6], which is calculated by the equation

The algorithm realized in Builder C++ 6.0 to code and to decode the satellite image256*256.

19
Advanced Computing: An International Journal (ACIJ), Vol.5, No.1, January 2014

Figure 1. Original Satellite image (1)

Figure 2. Reconstructed Satellite image (1)

20
Advanced Computing: An International Journal (ACIJ), Vol.5, No.1, January 2014

Figure 3. Original image ‘Lena’

Figure 4. Reconstructed image ‘Lena’

21
Advanced Computing: An International Journal (ACIJ), Vol.5, No.1, January 2014

Figure 5. Original Satellite image (2)

Figure 6. Reconstructed Satellite image (2)

22
Advanced Computing: An International Journal (ACIJ), Vol.5, No.1, January 2014

Image

PSNR(db)

CR

Lena

32.92

13.66

Satellite image (1)

34.68

15.89

Satellite image (2)

33.89

15.55

Table 1. The compression ratios CR and PSNR values derived for imageries

It can be seen from the Table 01 that for all the images the PSNR values are greater than 32, the
compression ratios CR achievable different it is clearly evident from the table that for two types
of images with reasonably PSNR values clearly indicate that the compression ratio achievable for
satellite imagere is much higher compared to the standard LENA image.

5. CONCLUSIONS
To improve the quantization step of the input vectors according to the code vectors present in a
dictionary using the evidence theory has obtaining promising results in our study, a vector
quantization was performed on each of the three colors (R,G,B) according to the color dispersion
of the K-nearest neighbor (K.N.N), The results show that the use of evidence theory during the
quantization phase and Huffman coding is an improvement of the quality of the reconstructed
satellite images

6. REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]

A. Gersho and R. M. Gray. Vector Quantization and Signal Compression. Kluwer Academic
Publishers,1991.
G.Shafer. A mathematical theory of evidence. Princeton University Press, 1976.
A. Dempster. Upper and Lower Probablilities Induced by Multivalued Mapping. Ann. Math. Statist ,
38:325– 339, 1967.
P.Smets. Constructing the pignistic probability function in a context of uncertainty. Uncertainty in
Artificial Intelligence, 5 :29–39, 1990. Elsevier Science Publishers.
H.Kekre, Tanuja K Sarode, Sanjay R Sange “ Image reconstruction using Fast Inverse Halftone &
Huffman coding Technique”, IJCA,volume 27-No 6, pp.34-40, 2011
V.Setia, Vinod Kumar, “Coding of DWT Coefficients using Run-length coding and Huffman Coding
for the purpose of Color Image Compression”, IJCA, volume 27-No 6, pp.696-699, 2012.

23

More Related Content

What's hot

IRJET-Design and Implementation of Haze Removal System
IRJET-Design and Implementation of Haze Removal SystemIRJET-Design and Implementation of Haze Removal System
IRJET-Design and Implementation of Haze Removal SystemIRJET Journal
 
New Approach for K-mean and K-medoids Algorithm
New Approach for K-mean and K-medoids AlgorithmNew Approach for K-mean and K-medoids Algorithm
New Approach for K-mean and K-medoids AlgorithmEditor IJCATR
 
Localization of Objects using Stochastic Tunneling
Localization of Objects using Stochastic TunnelingLocalization of Objects using Stochastic Tunneling
Localization of Objects using Stochastic TunnelingRana Basheer
 
Photoacoustic tomography based on the application of virtual detectors
Photoacoustic tomography based on the application of virtual detectorsPhotoacoustic tomography based on the application of virtual detectors
Photoacoustic tomography based on the application of virtual detectorsIAEME Publication
 
E XTENDED F AST S EARCH C LUSTERING A LGORITHM : W IDELY D ENSITY C LUSTERS ,...
E XTENDED F AST S EARCH C LUSTERING A LGORITHM : W IDELY D ENSITY C LUSTERS ,...E XTENDED F AST S EARCH C LUSTERING A LGORITHM : W IDELY D ENSITY C LUSTERS ,...
E XTENDED F AST S EARCH C LUSTERING A LGORITHM : W IDELY D ENSITY C LUSTERS ,...csandit
 
The Gaussian Process Latent Variable Model (GPLVM)
The Gaussian Process Latent Variable Model (GPLVM)The Gaussian Process Latent Variable Model (GPLVM)
The Gaussian Process Latent Variable Model (GPLVM)James McMurray
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
DERIVATION OF SEPARABILITY MEASURES BASED ON CENTRAL COMPLEX GAUSSIAN AND WIS...
DERIVATION OF SEPARABILITY MEASURES BASED ON CENTRAL COMPLEX GAUSSIAN AND WIS...DERIVATION OF SEPARABILITY MEASURES BASED ON CENTRAL COMPLEX GAUSSIAN AND WIS...
DERIVATION OF SEPARABILITY MEASURES BASED ON CENTRAL COMPLEX GAUSSIAN AND WIS...grssieee
 
Pillar k means
Pillar k meansPillar k means
Pillar k meansswathi b
 
Satellite Image Classification using Decision Tree, SVM and k-Nearest Neighbor
Satellite Image Classification using Decision Tree, SVM and k-Nearest NeighborSatellite Image Classification using Decision Tree, SVM and k-Nearest Neighbor
Satellite Image Classification using Decision Tree, SVM and k-Nearest NeighborNational Cheng Kung University
 
Satellite Image Classification using Decision Tree, SVM and k-Nearest Neighbor
Satellite Image Classification using Decision Tree, SVM and k-Nearest NeighborSatellite Image Classification using Decision Tree, SVM and k-Nearest Neighbor
Satellite Image Classification using Decision Tree, SVM and k-Nearest NeighborNational Cheng Kung University
 
VISUAL MODEL BASED SINGLE IMAGE DEHAZING USING ARTIFICIAL BEE COLONY OPTIMIZA...
VISUAL MODEL BASED SINGLE IMAGE DEHAZING USING ARTIFICIAL BEE COLONY OPTIMIZA...VISUAL MODEL BASED SINGLE IMAGE DEHAZING USING ARTIFICIAL BEE COLONY OPTIMIZA...
VISUAL MODEL BASED SINGLE IMAGE DEHAZING USING ARTIFICIAL BEE COLONY OPTIMIZA...ijistjournal
 

What's hot (20)

IRJET-Design and Implementation of Haze Removal System
IRJET-Design and Implementation of Haze Removal SystemIRJET-Design and Implementation of Haze Removal System
IRJET-Design and Implementation of Haze Removal System
 
A1804010105
A1804010105A1804010105
A1804010105
 
Knn demonstration
Knn demonstrationKnn demonstration
Knn demonstration
 
New Approach for K-mean and K-medoids Algorithm
New Approach for K-mean and K-medoids AlgorithmNew Approach for K-mean and K-medoids Algorithm
New Approach for K-mean and K-medoids Algorithm
 
Localization of Objects using Stochastic Tunneling
Localization of Objects using Stochastic TunnelingLocalization of Objects using Stochastic Tunneling
Localization of Objects using Stochastic Tunneling
 
50120140501016
5012014050101650120140501016
50120140501016
 
Photoacoustic tomography based on the application of virtual detectors
Photoacoustic tomography based on the application of virtual detectorsPhotoacoustic tomography based on the application of virtual detectors
Photoacoustic tomography based on the application of virtual detectors
 
E XTENDED F AST S EARCH C LUSTERING A LGORITHM : W IDELY D ENSITY C LUSTERS ,...
E XTENDED F AST S EARCH C LUSTERING A LGORITHM : W IDELY D ENSITY C LUSTERS ,...E XTENDED F AST S EARCH C LUSTERING A LGORITHM : W IDELY D ENSITY C LUSTERS ,...
E XTENDED F AST S EARCH C LUSTERING A LGORITHM : W IDELY D ENSITY C LUSTERS ,...
 
11 clusadvanced
11 clusadvanced11 clusadvanced
11 clusadvanced
 
07 Tensor Visualization
07 Tensor Visualization07 Tensor Visualization
07 Tensor Visualization
 
The Gaussian Process Latent Variable Model (GPLVM)
The Gaussian Process Latent Variable Model (GPLVM)The Gaussian Process Latent Variable Model (GPLVM)
The Gaussian Process Latent Variable Model (GPLVM)
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
DERIVATION OF SEPARABILITY MEASURES BASED ON CENTRAL COMPLEX GAUSSIAN AND WIS...
DERIVATION OF SEPARABILITY MEASURES BASED ON CENTRAL COMPLEX GAUSSIAN AND WIS...DERIVATION OF SEPARABILITY MEASURES BASED ON CENTRAL COMPLEX GAUSSIAN AND WIS...
DERIVATION OF SEPARABILITY MEASURES BASED ON CENTRAL COMPLEX GAUSSIAN AND WIS...
 
Pillar k means
Pillar k meansPillar k means
Pillar k means
 
robio-2014-falquez
robio-2014-falquezrobio-2014-falquez
robio-2014-falquez
 
3D reconstruction
3D reconstruction3D reconstruction
3D reconstruction
 
regions
regionsregions
regions
 
Satellite Image Classification using Decision Tree, SVM and k-Nearest Neighbor
Satellite Image Classification using Decision Tree, SVM and k-Nearest NeighborSatellite Image Classification using Decision Tree, SVM and k-Nearest Neighbor
Satellite Image Classification using Decision Tree, SVM and k-Nearest Neighbor
 
Satellite Image Classification using Decision Tree, SVM and k-Nearest Neighbor
Satellite Image Classification using Decision Tree, SVM and k-Nearest NeighborSatellite Image Classification using Decision Tree, SVM and k-Nearest Neighbor
Satellite Image Classification using Decision Tree, SVM and k-Nearest Neighbor
 
VISUAL MODEL BASED SINGLE IMAGE DEHAZING USING ARTIFICIAL BEE COLONY OPTIMIZA...
VISUAL MODEL BASED SINGLE IMAGE DEHAZING USING ARTIFICIAL BEE COLONY OPTIMIZA...VISUAL MODEL BASED SINGLE IMAGE DEHAZING USING ARTIFICIAL BEE COLONY OPTIMIZA...
VISUAL MODEL BASED SINGLE IMAGE DEHAZING USING ARTIFICIAL BEE COLONY OPTIMIZA...
 

Similar to Satellite image compression technique

The International Journal of Computational Science, Information Technology an...
The International Journal of Computational Science, Information Technology an...The International Journal of Computational Science, Information Technology an...
The International Journal of Computational Science, Information Technology an...rinzindorjej
 
Blind Image Seperation Using Forward Difference Method (FDM)
Blind Image Seperation Using Forward Difference Method (FDM)Blind Image Seperation Using Forward Difference Method (FDM)
Blind Image Seperation Using Forward Difference Method (FDM)sipij
 
Image Processing
Image ProcessingImage Processing
Image ProcessingTuyen Pham
 
BEHAVIOR STUDY OF ENTROPY IN A DIGITAL IMAGE THROUGH AN ITERATIVE ALGORITHM O...
BEHAVIOR STUDY OF ENTROPY IN A DIGITAL IMAGE THROUGH AN ITERATIVE ALGORITHM O...BEHAVIOR STUDY OF ENTROPY IN A DIGITAL IMAGE THROUGH AN ITERATIVE ALGORITHM O...
BEHAVIOR STUDY OF ENTROPY IN A DIGITAL IMAGE THROUGH AN ITERATIVE ALGORITHM O...ijscmcj
 
SEGMENTATION USING ‘NEW’ TEXTURE FEATURE
SEGMENTATION USING ‘NEW’ TEXTURE FEATURESEGMENTATION USING ‘NEW’ TEXTURE FEATURE
SEGMENTATION USING ‘NEW’ TEXTURE FEATUREacijjournal
 
Clustering Algorithms for Data Stream
Clustering Algorithms for Data StreamClustering Algorithms for Data Stream
Clustering Algorithms for Data StreamIRJET Journal
 
(17 22) karthick sir
(17 22) karthick sir(17 22) karthick sir
(17 22) karthick sirIISRTJournals
 
A COMPARATIVE STUDY ON DISTANCE MEASURING APPROACHES FOR CLUSTERING
A COMPARATIVE STUDY ON DISTANCE MEASURING APPROACHES FOR CLUSTERINGA COMPARATIVE STUDY ON DISTANCE MEASURING APPROACHES FOR CLUSTERING
A COMPARATIVE STUDY ON DISTANCE MEASURING APPROACHES FOR CLUSTERINGIJORCS
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
LOCAL DISTANCE AND DEMPSTER-DHAFER FOR MULTI-FOCUS IMAGE FUSION
LOCAL DISTANCE AND DEMPSTER-DHAFER FOR MULTI-FOCUS IMAGE FUSION LOCAL DISTANCE AND DEMPSTER-DHAFER FOR MULTI-FOCUS IMAGE FUSION
LOCAL DISTANCE AND DEMPSTER-DHAFER FOR MULTI-FOCUS IMAGE FUSION sipij
 
Local Distance and Dempster-Dhafer for Multi-Focus Image Fusion
Local Distance and Dempster-Dhafer for Multi-Focus Image FusionLocal Distance and Dempster-Dhafer for Multi-Focus Image Fusion
Local Distance and Dempster-Dhafer for Multi-Focus Image Fusionsipij
 
Local Distance and Dempster-Dhafer for Multi-Focus Image Fusion
Local Distance and Dempster-Dhafer for Multi-Focus Image FusionLocal Distance and Dempster-Dhafer for Multi-Focus Image Fusion
Local Distance and Dempster-Dhafer for Multi-Focus Image Fusionsipij
 
Rigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy SystemRigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy Systeminventy
 
Effect of Similarity Measures for CBIR using Bins Approach
Effect of Similarity Measures for CBIR using Bins ApproachEffect of Similarity Measures for CBIR using Bins Approach
Effect of Similarity Measures for CBIR using Bins ApproachCSCJournals
 
Imagethresholding
ImagethresholdingImagethresholding
Imagethresholdingananta200
 

Similar to Satellite image compression technique (20)

The International Journal of Computational Science, Information Technology an...
The International Journal of Computational Science, Information Technology an...The International Journal of Computational Science, Information Technology an...
The International Journal of Computational Science, Information Technology an...
 
Blind Image Seperation Using Forward Difference Method (FDM)
Blind Image Seperation Using Forward Difference Method (FDM)Blind Image Seperation Using Forward Difference Method (FDM)
Blind Image Seperation Using Forward Difference Method (FDM)
 
Image Processing
Image ProcessingImage Processing
Image Processing
 
BEHAVIOR STUDY OF ENTROPY IN A DIGITAL IMAGE THROUGH AN ITERATIVE ALGORITHM O...
BEHAVIOR STUDY OF ENTROPY IN A DIGITAL IMAGE THROUGH AN ITERATIVE ALGORITHM O...BEHAVIOR STUDY OF ENTROPY IN A DIGITAL IMAGE THROUGH AN ITERATIVE ALGORITHM O...
BEHAVIOR STUDY OF ENTROPY IN A DIGITAL IMAGE THROUGH AN ITERATIVE ALGORITHM O...
 
SEGMENTATION USING ‘NEW’ TEXTURE FEATURE
SEGMENTATION USING ‘NEW’ TEXTURE FEATURESEGMENTATION USING ‘NEW’ TEXTURE FEATURE
SEGMENTATION USING ‘NEW’ TEXTURE FEATURE
 
Clustering Algorithms for Data Stream
Clustering Algorithms for Data StreamClustering Algorithms for Data Stream
Clustering Algorithms for Data Stream
 
Gx3612421246
Gx3612421246Gx3612421246
Gx3612421246
 
2009 asilomar
2009 asilomar2009 asilomar
2009 asilomar
 
(17 22) karthick sir
(17 22) karthick sir(17 22) karthick sir
(17 22) karthick sir
 
A COMPARATIVE STUDY ON DISTANCE MEASURING APPROACHES FOR CLUSTERING
A COMPARATIVE STUDY ON DISTANCE MEASURING APPROACHES FOR CLUSTERINGA COMPARATIVE STUDY ON DISTANCE MEASURING APPROACHES FOR CLUSTERING
A COMPARATIVE STUDY ON DISTANCE MEASURING APPROACHES FOR CLUSTERING
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
I0341042048
I0341042048I0341042048
I0341042048
 
LOCAL DISTANCE AND DEMPSTER-DHAFER FOR MULTI-FOCUS IMAGE FUSION
LOCAL DISTANCE AND DEMPSTER-DHAFER FOR MULTI-FOCUS IMAGE FUSION LOCAL DISTANCE AND DEMPSTER-DHAFER FOR MULTI-FOCUS IMAGE FUSION
LOCAL DISTANCE AND DEMPSTER-DHAFER FOR MULTI-FOCUS IMAGE FUSION
 
Local Distance and Dempster-Dhafer for Multi-Focus Image Fusion
Local Distance and Dempster-Dhafer for Multi-Focus Image FusionLocal Distance and Dempster-Dhafer for Multi-Focus Image Fusion
Local Distance and Dempster-Dhafer for Multi-Focus Image Fusion
 
Local Distance and Dempster-Dhafer for Multi-Focus Image Fusion
Local Distance and Dempster-Dhafer for Multi-Focus Image FusionLocal Distance and Dempster-Dhafer for Multi-Focus Image Fusion
Local Distance and Dempster-Dhafer for Multi-Focus Image Fusion
 
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
IMAGE RETRIEVAL USING QUADRATIC DISTANCE BASED ON COLOR FEATURE AND PYRAMID S...
 
Rigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy SystemRigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy System
 
Effect of Similarity Measures for CBIR using Bins Approach
Effect of Similarity Measures for CBIR using Bins ApproachEffect of Similarity Measures for CBIR using Bins Approach
Effect of Similarity Measures for CBIR using Bins Approach
 
Imagethresholding
ImagethresholdingImagethresholding
Imagethresholding
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 

More from acijjournal

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfacijjournal
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfacijjournal
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfacijjournal
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdfacijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Developmentacijjournal
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principlesacijjournal
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...acijjournal
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...acijjournal
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
 

More from acijjournal (20)

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdf
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdf
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Satellite image compression technique

  • 1. Advanced Computing: An International Journal (ACIJ), Vol.5, No.1, January 2014 SATELLITE IMAGE COMPRESSION TECHNIQUE BASED ON THE EVIDENCE THEORY Khaled Sahnoun, Noureddine Benabadji Department of Physics, University of Sciences and Technology of Oran- Algeria Laboratory of Analysis and Application of Radiation ABSTRACT Satellite image Compression reduces redundancy in data representation in order to achieve saving in the cost of storage and transmission image compression compensates for the limited on-board resources, in terms of mass memory and downlink bandwidth and thus it provides a solution to the (bandwidth vs. data volume) dilemma of modern spacecraft Thus compression is very important feature in payload image processing units of many satellites, In this paper, an improvement of the quantization step of the input vectors has been proposed. The k-nearest neighbour (KNN) algorithm was used on each axis. The three classifications considered as three independent sources of information, are combined in the framework of the evidence theory the best code vector is then selected. After Huffman schemes is applied for encoding and decoding. KEYWORDS Evidence theory, Vector quantization, k-nearest neighbour ,compression, 1. INTRODUCTION The compression with vector quantization [1] accepts an input vector of dimension and replaced by a vector of the same size belonging to a dictionary which is a finite set of code also called classes, since they are calculated by an average iterative of vectors vectors , the quantization step based on the nearest neighbor rule: vector to classify is assigned to one class of under the condition that this assignment produces the smallest distortion, Such assignment rule may be too drastic in cases where the distances between the vector and other vector are very close a possible improvement to avoid this hard decision would be to consider each color components independently to obtain a classification by component, In this study, components (R,G,B) are considered as three independent information sources, In a first phase, the K-nearest neighbor rule is applied to all three components (R,G,B) then generating three sets of potential classes, This phase, taking into account K- neighbors and not one, allows considering uncertainty according to each of color components and to push decision making. The decision of the assignment final class of is done after combining these three classifications, This technique refers to methods of data fusion Among all the tools available in this domain, we decide to use the evidence theory [2] which makes it possible to process uncertain information and to combine information from several sources DOI : 10.5121/acij.2014.5102 17
  • 2. Advanced Computing: An International Journal (ACIJ), Vol.5, No.1, January 2014 2. USE THE EVIDENCE THEORY 2.1. Basic principle Let a set of all possible classes for corresponding to the dictionary in our application. The evidence theory extends over the entire power of , noted , we define an initial mass function of in which satisfies the following conditions And (1) Where is the empty set , quantifies the belief that be given to the fact that the class belongs to the subset of . Subsets like are called focal elements. Two initial mass functions ( ) can be combined according to Dempster rule [3] Is the conflict factor and represents the detuning between the two sources ( the combination of Dempster also called orthogonal sum and denoted ), Note that , After combination, a decision on the most likely element of must be taken. Several decision rules are possible, we use the “maximum of Pignistic probability” Presented by Smets [4] which uses the Pignistic transformation, and allows to evenly distributing the weight associated with a subset of , on each of its elements is called the Cardinal of largest. , The decision then goes to the element of , where this value is the 2.2. Application to the vector quantization 2.3. The quantization We represent the information provided by each independent classification according to each of the three 03components R, G, and B by a function of initial mass, These functions are created after calculating the K-nearest neighbor (KNN) and before the final decision they allow to take into account the uncertainty associated with each axis thus classes that are very close to each other on the same axis are grouped in the same focal element and the decision is made after having combined the results of the other projections for each axis identifies the most significant elements “ ” by a distance on this axis. The initial mass function constructed according to the axis has three focal elements ( ) is the complement of . We construct , Is the vector for classifying and the vector its nearest neighbor depending on , is a constant greater than 1 to take into account the sensitivity of the human visual system according to the axis , if then is a singleton corresponding to the nearest 18
  • 3. Advanced Computing: An International Journal (ACIJ), Vol.5, No.1, January 2014 neighbor, the masses are then assigned to the sets taking into account the distribution of elements in the set , the initial mass function for the axis is: Is a constant and . is the maximal distance between vector and of elements in the (R,G,B) space, is the average distance between each elements of , More is large more the mass of is small.( ) The three functions of initial mass from projections (R,G,B) respectively. Mass function resulting from the combination of this three functions is obtained from equation (02): The assignment class of the vector Pignistic probability equation (03) is selects from equation (09), on the basis of maximum of 3. HUFFMAN COMPRESSION FOR (R,G,B) The compression is achieved by compressing a range of values to a single quantum value, when the given number of discrete symbols in a given stream is reduced the stream becomes more compressible after the image is quantized, Huffman algorithm is applied. The Huffman has used a variable-length code table for the encoding of each character of an image where the variablelength code table is derived from the estimated probability of occurrence for each possible value of the source symbol, The Huffman coding has used a particular method for choosing the representation for each symbol which has resulted in a prefix codes, These prefix codes expresses the most common source symbols using shorter strings of bits than are used for less common source symbols. In this step we have achieved a compressed image [5]. 4 EXPERIMENTAL RESULTS AND DISCUSSION Different color images have been taken for experimental purpose, simulation results for different images are given in Table 01. For measuring the originality of the compressed image Peak Signal to Noise Ratio PSNR is used, which is calculated using the formula (10) Where MSE is the mean squared error between the original image and the reconstructed compressed image of the size MN [6], which is calculated by the equation The algorithm realized in Builder C++ 6.0 to code and to decode the satellite image256*256. 19
  • 4. Advanced Computing: An International Journal (ACIJ), Vol.5, No.1, January 2014 Figure 1. Original Satellite image (1) Figure 2. Reconstructed Satellite image (1) 20
  • 5. Advanced Computing: An International Journal (ACIJ), Vol.5, No.1, January 2014 Figure 3. Original image ‘Lena’ Figure 4. Reconstructed image ‘Lena’ 21
  • 6. Advanced Computing: An International Journal (ACIJ), Vol.5, No.1, January 2014 Figure 5. Original Satellite image (2) Figure 6. Reconstructed Satellite image (2) 22
  • 7. Advanced Computing: An International Journal (ACIJ), Vol.5, No.1, January 2014 Image PSNR(db) CR Lena 32.92 13.66 Satellite image (1) 34.68 15.89 Satellite image (2) 33.89 15.55 Table 1. The compression ratios CR and PSNR values derived for imageries It can be seen from the Table 01 that for all the images the PSNR values are greater than 32, the compression ratios CR achievable different it is clearly evident from the table that for two types of images with reasonably PSNR values clearly indicate that the compression ratio achievable for satellite imagere is much higher compared to the standard LENA image. 5. CONCLUSIONS To improve the quantization step of the input vectors according to the code vectors present in a dictionary using the evidence theory has obtaining promising results in our study, a vector quantization was performed on each of the three colors (R,G,B) according to the color dispersion of the K-nearest neighbor (K.N.N), The results show that the use of evidence theory during the quantization phase and Huffman coding is an improvement of the quality of the reconstructed satellite images 6. REFERENCES [1] [2] [3] [4] [5] [6] A. Gersho and R. M. Gray. Vector Quantization and Signal Compression. Kluwer Academic Publishers,1991. G.Shafer. A mathematical theory of evidence. Princeton University Press, 1976. A. Dempster. Upper and Lower Probablilities Induced by Multivalued Mapping. Ann. Math. Statist , 38:325– 339, 1967. P.Smets. Constructing the pignistic probability function in a context of uncertainty. Uncertainty in Artificial Intelligence, 5 :29–39, 1990. Elsevier Science Publishers. H.Kekre, Tanuja K Sarode, Sanjay R Sange “ Image reconstruction using Fast Inverse Halftone & Huffman coding Technique”, IJCA,volume 27-No 6, pp.34-40, 2011 V.Setia, Vinod Kumar, “Coding of DWT Coefficients using Run-length coding and Huffman Coding for the purpose of Color Image Compression”, IJCA, volume 27-No 6, pp.696-699, 2012. 23