Gamboled Image Compression Technique for Low Power

Transcription

Gamboled Image Compression Technique for Low Power
DOI 10.4010/2016.1596
ISSN 2321 3361 © 2016 IJESC
Research Article
Volume 6 Issue No. 6
Gamboled Image Compression Technique for Low Power Devices
with Binary DCT and Torus Automorphism
G.Suseela1, Asnath Victy Phamila.Y2
School of Computing Science and Engineering, VIT University, Chennai Campus, India
[email protected], [email protected]
Abstract:
Image data are huge in size, requiring more storage space and processing power. Low power communication devices like handheld
electronic gadgets, sensor nodes in the sensor network, etc., have to spend more resource for processing the image data. Image
compression is obligatory for resource efficient communication and image retrieval. The standard image compression algorithms are
encompassing complex computations and are not power efficient. Image data are sensitive against attacks and self-descriptive.
Secured image transmission is desirable along with compression for defending against attacks and privacy fortification. Hence forth a
low complex power efficient robust image compression algorithm is focused. This paper presents a new robust image compression
algorithm using Torus-automorphism and Binary DCT.
Keywords: DCT, Image Compression, Torus-automorphism
I.INTRODUCTION
The modern advancements in multimedia based communication
technology and micro electro mechanical systems, have
fostered image and video communication over the resource
restricted low power communication devices like handheld
electronic gadgets, sensor nodes. Image data contains large
amount of pixel redundancies with the neighboring pixels.
Uncompressed raw image data will be requiring more space
and bandwidth, moreover the network resources will be
demoralized. To have efficient storage and transmission
compression is very much required. The process of removing
the redundancies and irrelevancies is termed to be compression.
The main objective any image compression technique is to
remove the redundancies present in the image and to preserve
the significant information present in the image data.
Compression can be lossy compression and lossless
compression. Lossy compression will have greater compression
ratio than lossless techniques with satisfactory image quality
[1]. For battery power supplied low power devices like mobile
phones and camera equipped image sensor nodes has to spend
their energy economically for having extended life span.
Further they can be transform based or non-transform based.
Transform based compression algorithm follows a three step
chained process i.e., (Transformation-Quantization-Entropy
coding).
Transforms will transfigure and group the pixel matrix
based on redundancy and relevancy. The widely used
Transforms are Discrete Cosine Transform (DCT) [2] and
Discrete Wavelet Transform (DWT) [3].For secured image
transmission, image encryption using Torus Automorphism
(TA) is accomplished [4]. Since images are self-descriptive,
will not require any distinctive mechanism to interpret if
tampered. Any image encryption algorithm aims in encrypting
the image into an unreadable ciphered image. TA is basically a
dynamic system whose state changes with time. In image TA is
used to transposition the pixels inside image.
International Journal of Engineering Science and Computing, June 2016
II.PROPOSED SYSTEM
The proposed system in this communication follows three
processes.1.Pixel removal, 2.Torus Automorphism and
3.Binary DCT
Figure 1.Three step Image compression chain
PIXEL BLOCK REMOVAL
The first process is redundancy removal at spatial domain. As
image contains huge amount of redundancy due to neighboring
pixel correlation, this type of redundancy removal is aimed and
removed. This is emphasized in two stages. At first the image is
segmented into tiny matrices each of size 2 x 2 and in second
step alternating blocks are gamboled .In other words odd
numbered blocks are retained and even numbered blocks are
discarded both row and column wise. By doing this the image
size is halved in 2D i.e, 75% of redundancy removed.
TORUS AUTOMORPHISM
Torus Automorphism (TA) is a dynamic system whose state ‘s’
changes with respect to time ‘t’. TA can be viewed as
permutation in two dimensional spaces like matrices using a
transform function [1]. With pixel matrices TA is used for pixel
position trundling within the image in image encryption system.
The new pixel positions are determined using the transform
function as shown in (1). Where xn and yn are the shuffled new
pixel positions and x0, y0 are the original pixel positions. The
result of the TA is an obfuscated image so that the image
becomes unreadable.
.
6655
(1)
http://ijesc.org/
BINARY DCT
Discrete Cosine Transform (DCT) is very much suitable for
resource restricted environment, as it is applied to small blocks
of the pixel matrix usually of size 8x8 [3].The lead role in the
JPEG image compression standard was played by DCT. Even
though DCT matrix requires less memory it involves intensive
complex computation with floating point operations for each
individual block.Trans.D, 2000 introduced a hardware friendly
fast DCT called as Binary DCT [5]. Binary DCT uses only
integer operation and all complex multiplications are replaced
by binary bit shifters. Binary DCT does not
involve any
multiplication operation. It uses only bit shifters and adders.
Each value in the Binary DCT coefficient matrix is an
approximated value of the true DCT matrix. Hence Binary
DCT holds all the properties of DCT like coding gain, energy
compaction, and null DC leakage. Because of the above stated
merits of Binary DCT, the proposed system adapted binary
DCT to make it suitable for resource (processing hardware)
limited environments.
III.EXPERIMENTAL RESULTS AND DISCUSSION
The proposed compression technique has been implemented
and carried out in Matlab 2013a.The experiments have been
repeated for standard gray scale test images of Lena,, peppers
,Baboon and Barbara all of size 512 x512 and results were
presented in Figure 1. The compression performance metric is
determined by the quality of the reconstructed image at
decompressor and compression ratio. One of the widely
accepted models are MSE and PSNR.
Peak Signal to Noise Ratio: PSNR is defined as the degree of
error relative to peak value of the image and the amount of
distortion present in compressed image. PSNR is measured in
decibels and higher the PSNR value higher the image quality
(for 8-bit grey scale image peak pixel value is 255).
.
(2)
Where MSE is Mean Square Error defined amount of existing
between original and reconstructed images.
(3)
Compression Ratio (CR): Higher the compression ratio better
the compression technique. It is defined as ratio between the
sizes of original uncompressed image and the compressed
image.
.
(4)
The
proposed compression technique offers a very good
compression ratio of 1:4. The PSNR and compression ratio
achieved by the proposed system in Table 1.
Input Lena Image
Encrypted And Compressed Lena Image
Decrypted And Decompressed Lena Image
Input peppers Image
Encrypted and compressed peppers Image
Decrypted and decompressed peppers Image
Input Baboon Image
Encrypted and compressed Baboon Image
Decrypted and decompressed Baboon Image
Input Barbara Image
Encrypted and compressed Barbara Image
Decrypted and decompressed Barbara Image
Figure 2. Experimented original, encrypted and decrypted and compressed images
International Journal of Engineering Science and Computing, June 2016
6656
http://ijesc.org/
Table 1. PSNR and CR values
Images
PSNR
CR
Lena
59.00
4
Baboon
48.38
4
Girlface
47.39
4
Peppers
34.57
4
Barbara
42.03
4
IV.CONCLUSION
In this paper, an image compression algorithm is proposed
along with encryption .Experiments have been carried out and
results were analyzed. As far as wireless multimedia
communication is concerned image compression algorithm
with high compression ratio is extremely required. The
proposed system offered compression ratio of 1:4 with
acceptable image quality. Also it emphasized defending
mechanism against various attacks. Since the system used
multiplier less DCT version with integer operation makes it
suitable for low power small hand devices like mobile phones,
tabs and tiny camera sensor nodes in the sensor network.
V.REFERENCES
[1] Kumar G, Shrivastava P, Scholar PG. A Survey of
Various Image Compression Techniques for RGB
Images. International Journal of Engineering Science.
2016 May;4905.
[2] Rao, K., Yip., P.,:’ Discrete Cosine TransformAlgorithms, Advantages, Applications’, Academic.
NewYork,1990
[3] Mohsen Nasri, Abdelhamid Helali, HalimSghaier,
Hassen Maaref,"Adaptive image compression
technique for wireless sensor networks": Computers
& Electrical Engineering. September 2011.
[4] Cristian Duran Faundez, Vincent Lecuire, Francis
Lepage “Tiny block-size coding for energy-efficient
image compression and communication in wireless
camera sensor network”: Signal Processing: Image
Communication 26 (2011).
[5] Tran, T.: ’The binDCT: fast multiplierless
approximation of the DCT’, IEEE Signal Processing
Letters,2000,7,(6),pp.141-144
International Journal of Engineering Science and Computing, June 2016
6657
http://ijesc.org/