Comparison and Analysis of an efficient Image Compression Technique Based on Discrete 2-D wavelet transforms with Arithmetic Coding
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.2, No. 5)Publication Date: 2012-09-27
Authors : Deepika Sunoriya; Uday Pratap Singh; Vineet Ricchariya;
Page : 65-74
Keywords : Walsh-Wavelet Transform; Image Compression; db1; db2; Quantization .;
Abstract
When a great deal is known about the regularities in the ?les to be compressed, e.g., in the compression of image, audio, photo and video data, it is possible to match different compression algorithms with different parts of the data in such a way to achieve the maximum compression ratio, thereby providing signi?cant reductions in ?le sizes. These algorithms are difficult to derive and are often the result of many person years of effort. Nonetheless, these are so successful that effectively some types of data are regularly saved, kept and transferred, only in compressed form, to be decompressed automatically and transparently to the user only when loaded into applications that make use of them. Our proposed approach is the combination of several approaches to make the compression better than the previous used approach. We first apply two Levels Discrete Wavelet Transform and then apply Walsh-Wavelet Transform on each 8x8 block of the low-frequency sub-band, then Split all DC values form each transformed block 8x8. Finally we perform compression by using arithmetic coding. In our algorithm we provide the basis of accepting images from the database. We concentrate the type of the wavelet we use like db1, db2, db3 etc. Then we use the quantization factor which is CF1 and CF2 in our case. We use the value as 0.05 and 0.2 as the quantization factor. After matlab simulation we can find our results suitable than the previous work.
Other Latest Articles
- Location Privacy Using User Anonymity and Dummy Locations
- A Review of Content Based Image Classification using Machine Learning Approach
- Prevention of Cross-Site Scripting Vulnerabilities using Dynamic Hash Generation Technique on the Server Side
- Medical Image Protection using steganography by crypto-image as cover Image
- Removal of cyclic prefix in Adaptive Non-Contiguous OFDM for Dynamic Spectrum Access using DWT and WT
Last modified: 2014-11-25 18:11:10