SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Advances in Physics Theories and Applications                                                  www.iiste.org
ISSN 2224-719X (Paper) ISSN 2225-0638 (Online)
Vol 3, 2012



   Compression Technique Using DCT & Fractal Compression
                                             – A Survey
                                           R M Goudar 1 * Priya Pise2*
    1.   Dept Of Computer , Maharashtra Academy Of Engg Alandi (D) ,Pune.
    2.   Dept Of IT , Indira College Of Engg , Parandwadi ,Tal- Maval ,Pune
    * E-mail of the corresponding author: rmgoudar66@gmail.com;priya.pise@gmail.com


Abstract
Steganography differs from digital watermarking because both the information and the very existence of the
information are hidden. In the beginning, the fractal image compression method is used to compress the
secret image, and then we encrypt this compressed data by DES.The Existing Steganographic approaches
are unable to handle the Subterfuge attack i.e, they cannot deal with the opponents not only detects a
message ,but also render it useless, or even worse, modify it to opponent favor. The advantage of BCBS is
the decoding can be operated without access to the cover image and it also detects if the message has been
tampered without using any extra error correction. To improve the imperceptibility of the BCBS, DCT is
used in combination to transfer stego-image from spatial domain to the frequency domain. The hiding
capacity of the information is improved by introducing Fractal Compression and the security is enhanced
using by encrypting stego-image using DES.
Keywords: Steganography, data hiding, fractal image compression, DCT.
1. Introduction
One of the important application of data compression is image processing on digital images. It reduces the
redundancy of image data to store it efficiently Multimedia data which is uncompressed (graphics ,audio ,
video ) need storage capacity & transmission bandwidth .Now a days there is rapid progress in mass storage
density & digital communication system performance . The future of multimedia based web applications is
data intensive , so we need to have efficient way to encode signal & images .Compression is achieved by
the removal of one or more of three basic data redundancies: (1) Coding redundancy, which is present when
less than optimal (i.e. the smallest length) code words are used(2) Interpixel redundancy, which results from
correlations between the pixels of an image & (3) psycho visual redundancy which is due to data that is
ignored by the human visual system (i.e. visually nonessential information).In this paper will mainly
concentrate on the comparative study of compression techniques namely DCT (Discrete Cosine Transform)
& Fractal Compression.
2. Review Of Compression Technique
2.1.DCT (Discrete Cosine Transform) : A discrete cosine transform (DCT) is a sequence of finitely
many data points in terms of a sum of cosine functions oscillating at different frequencies. From lossy
compression of audio and images to spectral methods for the numerical solution of partial differential
equations , it turns out that cosine functions are much more efficient , whereas for differential equations the
cosines express a particular choice of boundary conditions. Here is a block diagram explaining the same,
followed by the decoding of the image.




                                          Fig 1 Encoding of DCT
                                                      9
Advances in Physics Theories and Applications                                                www.iiste.org
ISSN 2224-719X (Paper) ISSN 2225-0638 (Online)
Vol 3, 2012




                                             Fig 2 Decoding of DCT

2.2. Fractal Compression: The method relies on the fact that in a certain images, parts of the image
resemble other parts of the same image (self-similarity). But the computation time required to encode an
image might be very long due to an exhaustive search for the optimal code. It is lossy image compression
technique ,achieve high level of compression preserves the quality as of the original image . Its working is
as shown in the figure 3.

                                                          Start



                                          Partition the image into domain regions



                                        Choose a set of allowable range regions




                               Choose a set of affine transformations will be considered
                                            when searching the best range



                                                 Point to the first domain




                                     Compare image data with each possible range




            Point to first domain
                                                       Is this a last
                                                         domain ?




                                                    Output a fractal file



                                                              Stop


                                    Fig 3 Algorithm for fractal compression



                                                         10
Advances in Physics Theories and Applications                                                 www.iiste.org
ISSN 2224-719X (Paper) ISSN 2225-0638 (Online)
Vol 3, 2012

3.Review of Compression Algorithms
The techniques used to compress/decompress a single gray level image are expected to be easily modified
to encode/ decode color images and image sequences . The goal of image compression is to save storage
space and to reduce transmission time for image data. It aims at achieving a high compression ratio (CR)
while preserving good fidelity of decoded images.. Recent compression methods can be briefly classified
into four categories: (a) Wavelet, (b) JPEG/DCT, (c) VQ, and (d) Fractal methods, which are discussed by
various people are briefly reviewed below.
Chin-Chen Chang discussed [3] that proposed model does the data embedding into the cover
image by changing the coefficients of a transform of an image such as discrete cosine transform. The high
compression rate is one of the advantages of fractal image compression. Main advantage is the good image
quality, after enough iteration for decompression. But the computation time required to encode an image
might be very long due to an exhaustive search for the optimal code. And DES encryption is used to
provide the security to the data, but it is unable to protect the Stego-Image from subterfuge attack. Which is
nothing but , the attacker not only detect a message, but also render it useless or even worse, modify it to
the opponent’s favor.
K.B.Raja [4] has proposed a model which uses LSB ,but LSB provides poor security ,and DCT for
converting objects in spatial domain to frequency domain. This model uses only raw Images because of
subterfuge attack. The JPEG, BMP and GIF image formats, the header contains most of the image
information. This leads to the problem of insecurity and therefore the payloads from such images can be
easily identified.
Hairong Qi discussed in [2] that in the proposed model the technique BCBS(Blind Consistency Based
Steganography)is used .The advantage of the BCBS approach is that the decoding process can be operated
blindly without access to the cover image, which enhances the imperceptibility. And that it not only
decodes the message exactly, it also detects if the message has been tampered without using any extra error
correction. The main drawback is the amount of data to hide is very less because he is selected only one
row / Column to hide with one bit per pixel. And also the security is provided only for the Stego-Image not
for the data that can be improved by using DES.
Niels Provos [6] has found PSNR(Peak Signal To Noise Ratio) to be a good indicator of finger and face
recognition matching scores in the case of JPEG2000 and SPIHT. Both wavelet-based algorithms perform
exceptionally well in terms of rate-distortion performance and matching scores of all recognition systems
considered. While PSNR exactly predicts the poor matching scores of fractal compression the case of
fingerprint images, the relatively high PSNR results for face images suggest fractal compression to perform
superior to JPEG for this biometric modality. The opposite is true – despite the low PSNR results, JPEG
performs quite well in face recognition applications for high and medium bit rate applications
Chin-Chen Chang [3] He has proposed a scheme to embed an image compressed via fractal image
compression into the DCT domain of the cover image. Due to the high compression rate of fractal
compression, also it can embed a secret image larger than the cover image itself. Moreover, the more
decompression iterations will be done, the better decompressed secret image quality will get. Also, these
compression codes of fractal compression must not be lost, or the embedded message cannot be extracted.
Thus some modification on the bit streams of the modified coefficients to prevent the information loss
caused by discrete cosine transformation. As for security, encrypt the compressed data via DES so that it
can be prevent the eavesdroppers from getting the secret image.
Chaur-Chin Chen [25] has only reviewed and summarized the characteristics of four up-to-date image
coding algorithms based on Wavelet, JPEG/DCT, VQ, and Fractal approaches[5]. Experimental
comparisons on four 256×256 commonly used images, Jet, Lenna, Mandrill, Peppers, and one 400×400
fingerprint image suggest a recipe described as follows. Any of the four approaches is satisfactory when
the 0.5 bits per pixel (bpp) is requested. Hence for practical applications, he concluded that wavelet based
compression algorithms are strongly recommended.


                                                     11
Advances in Physics Theories and Applications                                                 www.iiste.org
ISSN 2224-719X (Paper) ISSN 2225-0638 (Online)
Vol 3, 2012

N. F. Johnson [22] brought the Tree Structured VQ techniques in order to decrease the table storage needed
for en-coding and decoding along with unstructured vector quantization (UVQ) or Tree-Structured Vector
Quantization (TSVQ). Particularly, a low-storage Secondary Quantizer is employed to squeeze the code
vectors of the primary quantizer. The absolute benefits of uniform and non-uniform Secondary
Quantization are examined. Quantization levels are put up on a binary or Quad tree structure (sub-optimal).
It is to set vectors in different quadrant. Signs of vectors are only needed to be evaluated. This will reduce
the number of links by 2^L for L-d vector problem. It will work fine for symmetric distribution
According to Sachin Dhawan., [24] the hybrid VQ algorithm is explained as follows, first the correlation
in the test image is taken away by wavelet transform. Wavelet transform is employed in the course of lifting
scheme. The wavelet employed during lifting scheme is HAAR wavelet. Then it will lead with the primary
level of decomposition gives way four components namely LL, LH, HL and HH correspondingly.
Multistage VQ is implemented to LL band. The pointed coefficients in the sub band LH, HL and HH are
pyramidal vector quantized by capturing vectors of stated measurement. Finally an entropy coding
algorithm like Huffman coding is implemented as the final stage of the compression system to code the
indices. He has proposed an algorithm groups the benefit of lessening of codebook searches and storage
complexity which is intrinsic to MSVQ .Additionally pyramid vector quantization may not need great
codebook storage having simple encoding and decoding algorithm. Hence high compression ratio can be
accomplished by including PVQ along with MSVQ.
4. Measuring Compression Performances
There are different criterion for measuring the performance of the compression also it depends on the
nature of the application .When measuring the performance the main concern would be the space efficiency.
The time efficiency is another factor. Since the compression behavior depends on the redundancy of
symbols in the source file, it is difficulty to measure performance of a compression algorithm in general.
The performance depends on the type and the structure of the input source. Additionally the compression
behavior depends on the category of the compression algorithm: lossy or lossless. If a lossy compression
algorithm is used to compress a particular source file, the space efficiency and time efficiency would be
higher than that of the lossless compression algorithm. Thus measuring a general performance is difficult
and there should be different measurements to evaluate the performances of those compression families.


4.1 Following are some measurements used to evaluate the performances of lossless algorithms.
1.Compression Ratio is the ratio between the size of the compressed file and the size of the source file.
Compression Factor is the inverse of the compression ratio. That is the ratio between the size of the source
file and the size of the compressed file. Saving Percentage calculates the shrinkage of the source file as a
percentage. % size before compression saving percentage size before compression size after compression
 All the above methods evaluate the effectiveness of compression algorithms using file sizes. There are
some other methods to evaluate the performance of compression algorithms. Compression time,
computational complexity and probability distribution are also used to measure the effectiveness.
2.Entropy This can be used, if the compression algorithm is based on statistical information of the source
file. Self Information is the amount of one’s surprise evoked by an event. In another words, there can be
two events: first one is an event which frequently happens and the other one is an event which rarely
happens. If a message says that the second event happens, then it will generate more surprise in receivers
mind than the first message.
3.Code Efficiency Average code length is the average number of bits required to represent a single code
word. If the source and the lengths of the code words are known, the average code length can be
calculated .
4. Bit Error Rate (BER): Here we compute the BER for two equal size images that is cover image and
stego-image. BER is more accurate for error analysis when compared to MSE, because in BER we compute
the actual number of bit positions which are replaced in the stego image , which is calculated by

                                                     12
Advances in Physics Theories and Applications                                               www.iiste.org
ISSN 2224-719X (Paper) ISSN 2225-0638 (Online)
Vol 3, 2012

                                                  m−1
                                      H (e) = −∑ p(e i ) log 2 p(ei )
                                                  i=0



5. Mean square error (MSE): The MSE is computed by performing byte by byte comparisons of the two
images, since a pixel is represented by 8 bits and hence 256 levels are available to represent the various
gray levels. The MSE will result in a meaningful value only when each byte of an image is compared with
the corresponding byte of another image. Let c and s be the cover image and stego-image respectively. Let
n*n be the total number of pixels. The computation of MSE can be performed as follows,

                                                        n −1
                                 MSE= 1 ÷ n × n ∑ (c(i, j ) − s (i, j ) 2
                                                    i , j =0




             Method                    Advantages                           Disadvantages

          Wavelet     High    -High Compression Ratio           -Coefficient quantization
           Compression        -State-Of-The-Art                 -Bit allocation

                                                                -Coefficient(dct) quantization
                JPEG          -Current Standard
                                                                -Bit allocation
                              -Simple decoder                   -Slow codebook generation
                 VQ
                              -No-coefficient quantization      -Small bpp
                              -Good mathematical
                Fractal                                         -Slow Encoding
                              -Encoding-frame
                                  Table 1 Comparisons of methods[24]
5. Conclusion
Here after reviewed & summarizing the techniques of image compression ie, Wavelet, JPEG/ DCT,VQ, and
Fractal approaches with the help of their experimental outcomes given by respective authors, so for
practical approach we conclude that (1) Wavelet based compression algorithms are strongly recommended
(2) DCT based approach might use an adaptive quantization table (3) VQ approach is not appropriate for a
low bit rate compression although it is simple (4) Fractal approach should utilize its resolution-free
decoding property for a low bit rate compression.
References
K.Munivara Prasad, V.Jyothsna,S.H.K.Raju, S.Indraneel (April2010) “High Secure Image Steganography in
   BCBS Using DCT and Fractal Compression” IJCSNS International Journal of Computer Science and
   Network Security, VOL.10 No.4
Hairong Qi (2002) “Blind consistency based steganography for information hiding in digital media”,
    International Conference on Images Steganography.
Chin-Chen Chang, Chi-Lung Chiang, and ,Ju-Yuan Hsiao(2005 ) “A DCT-domain System for Hiding Fractal
    Compressed Images” Proceedings of the 19th International Conference on Advanced Information
    Networking and Applications
K.B.Raja, C.R.Chowdary, Venugopal K R, L.M.Patnaik (2005) “A Secure Image Steganography using LSB,
    DCT and Compression Techniques on Raw Images ”International conference on Image and Signal
    Processing ,2005.N.F.,

                                                        13
Advances in Physics Theories and Applications                                              www.iiste.org
ISSN 2224-719X (Paper) ISSN 2225-0638 (Online)
Vol 3, 2012

Johnson and ,Sushil Jajodia, Chaur-Chin Chen ( February 1998) “Exploring steganography, seeing the
    unseen,” IEEE Computer, pp. 26–34
Niels Provos, (December 2004)"A Secure Stegonographic Algorithm using LSB, DCT and Image
    Compression on Raw Images",Technical Report,Department of Computer Science and Engineering,
    University Visvesvaraya College of Engineering, Bangalore University
R.Anderson and F. Petitcolas,(August 2001)"Defending against statistical steganalysis", In Proceedings of
   the 10th USENIX Security Symposium, pp. 323-335
Niels Provos, Peter Honeyman (May 1998) "On the limits of steganography" IEEE Journal of Selected Areas
    in Communications, Vol. 16, No. 4, , pp. 474-48 1.
Tzschoppe, Robert Bauml, Johannes B.Huber, and Andre Kaup(2003 ) "Hide and Seek: An Introduction to
    Steganography," IEEE computer society, pp. 32-44. Roman.
V,Santa,     Clara,    California,USA,(2003)“Steganographic    System     Based    on    Higher-Order
    Statistics”.Proceedings of SPIE Vol. 5020, Security and Watermarking of Multimedia Contents. Siwei
    Lyu, Hany Farid.
LOW, S., MAXLMCHUK, K.F.. and O’GORMAN. (2006) “Steganalysis Using Higher-Order Image
   Statistics”. IEEE Transactions on Information Forensiscs and Security,Vol 1,NO.1,USA, BRASSIL, J.T.
BENDER, W, GRUIIL, D , MOIIIMO IO, N . and LU, A (2006) ‘Fhtronic markinlr and identification
   techniuue to discouralre document copying’, IEEE
WALTON,. Katzenbeisser and F. Petitcolas,( 2001.) ‘for data hiding’, ZBM $yrt. 1; 1996, 35. (3,4),p p. 313
  330 IURNER, L.F.: ‘Digital data security system, Patent IPN Mi0 89’08915 4
Artech House (2000) Compute          Information Hiding Techniques for Steganography and Digital
    Watermarking,.
J. Fridrich, MARVEL, L.M., BONCELET, C.G., Jr., and RETTER, C.T ( , August 1999) ”Applications of
     data hiding in digital images,” in Tutorial for the ISSPA’99 Conference, Brisbane, Australia
Siwei Lyu, Hany Farid. (2003)“Steganographic System Based on Higher-Order Statistics”.Proceedings of
    SPIE Vol. 5020, Security and Watermarking of Multimedia Contents V, Santa Clara, California, USA,
    2003
BRASSIL, J.T., LOW, S., MAXLMCHUK, K.F.. and O’GORMAN. (2006)“Steganalysis Using
   Higher-Order Image Statistics”. IEEE Transactions on Information Forensiscs and Security,Vol
   1,NO.1,USA
MARVEL, L.M., BONCELET, C.G., Jr., and RETTER, C.T J. Fridrich, (August 1999)”Applications of data
  hiding in digital images,” in Tutorial for the ISSPA’99 Conference, Brisbane, Australia, , pp. 22-25.
Aug 1999“Spread Spectrum Image Steganography”, IEEE trans. Image Process., 8(8), , pp.1075-1083
Fast Algorithm of the DCT and IDCT for VLSI Implementation Mong Ying Hou Zhaohuan Institute of
    Acoustics, Chinese Academy of Sciences
A. K. Jain and U. Uludag. (2003) “Hiding biometric data”IEEE Trans. Pattern Analysis and Machine
    Intelligence, 25(11):1494–1498
N. F. Johnson and S. Katzenbeisser. (2008)“A survey of steganographic techniques, Information Hiding”
    Artech House, Norwood
Y. Fisher, Editor, (1994.)“Fractal Image Compression: Theory and Applications”, Springer-Verlag,
Sachin Dhawan Kurukshetra, Haryana, India,May (2011)A Review of Image Compression and Comparison
    of its Algorithms Deptt. of ECE, UIET, Kurukshetra University,
Chaur-Chin Chen (2009) “On the Selection of Image Compression Algorithms “Department of Computer
   Science National Tsing Hua UniversityHsinchu 300, Taiwan


                                                   14

Más contenido relacionado

La actualidad más candente

Self Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMSelf Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMIDES Editor
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking BasicsIOSR Journals
 
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...CSCJournals
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsCSCJournals
 
An Efficient Analysis of Wavelet Techniques on Image Compression in MRI Images
An Efficient Analysis of Wavelet Techniques on Image Compression in MRI Images An Efficient Analysis of Wavelet Techniques on Image Compression in MRI Images
An Efficient Analysis of Wavelet Techniques on Image Compression in MRI Images Associate Professor in VSB Coimbatore
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...ijait
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...ijma
 
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGEMULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGEijcsity
 

La actualidad más candente (15)

Self Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMSelf Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOM
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
 
Digital Image Watermarking Basics
Digital Image Watermarking BasicsDigital Image Watermarking Basics
Digital Image Watermarking Basics
 
G0523444
G0523444G0523444
G0523444
 
92 97
92 9792 97
92 97
 
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image Cryptosystems
 
An Efficient Analysis of Wavelet Techniques on Image Compression in MRI Images
An Efficient Analysis of Wavelet Techniques on Image Compression in MRI Images An Efficient Analysis of Wavelet Techniques on Image Compression in MRI Images
An Efficient Analysis of Wavelet Techniques on Image Compression in MRI Images
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
G0210032039
G0210032039G0210032039
G0210032039
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
 
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGEMULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
 
Steganography
Steganography Steganography
Steganography
 
C010231217
C010231217C010231217
C010231217
 
Ja2415771582
Ja2415771582Ja2415771582
Ja2415771582
 

Destacado

Data Compression Technique
Data Compression TechniqueData Compression Technique
Data Compression Techniquenayakslideshare
 
data compression technique
data compression techniquedata compression technique
data compression techniqueCHINMOY PAUL
 
Fundamentals of Data compression
Fundamentals of Data compressionFundamentals of Data compression
Fundamentals of Data compressionM.k. Praveen
 
Test Driven Design - GDG DevFest Istanbul 2016
Test Driven Design - GDG DevFest Istanbul 2016Test Driven Design - GDG DevFest Istanbul 2016
Test Driven Design - GDG DevFest Istanbul 2016Lemi Orhan Ergin
 

Destacado (9)

Data Compression Technique
Data Compression TechniqueData Compression Technique
Data Compression Technique
 
Image compression
Image compressionImage compression
Image compression
 
Data compression
Data compressionData compression
Data compression
 
data compression technique
data compression techniquedata compression technique
data compression technique
 
Data compression
Data compression Data compression
Data compression
 
Fundamentals of Data compression
Fundamentals of Data compressionFundamentals of Data compression
Fundamentals of Data compression
 
Compression
CompressionCompression
Compression
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 
Test Driven Design - GDG DevFest Istanbul 2016
Test Driven Design - GDG DevFest Istanbul 2016Test Driven Design - GDG DevFest Istanbul 2016
Test Driven Design - GDG DevFest Istanbul 2016
 

Similar a Compression technique using dct fractal compression

3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compressionAlexander Decker
 
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...Associate Professor in VSB Coimbatore
 
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...Alexander Decker
 
A Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWTA Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWTIJSRD
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyIOSR Journals
 
Comparison and improvement of image compression
Comparison and improvement of image compressionComparison and improvement of image compression
Comparison and improvement of image compressionIAEME Publication
 
Comparison and improvement of image compression
Comparison and improvement of image compressionComparison and improvement of image compression
Comparison and improvement of image compressionIAEME Publication
 
Comparison and improvement of image compression
Comparison and improvement of image compressionComparison and improvement of image compression
Comparison and improvement of image compressionIAEME Publication
 
A spatial image compression algorithm based on run length encoding
A spatial image compression algorithm based on run length encodingA spatial image compression algorithm based on run length encoding
A spatial image compression algorithm based on run length encodingjournalBEEI
 
Maximizing Strength of Digital Watermarks Using Fuzzy Logic
Maximizing Strength of Digital Watermarks Using Fuzzy LogicMaximizing Strength of Digital Watermarks Using Fuzzy Logic
Maximizing Strength of Digital Watermarks Using Fuzzy Logicsipij
 
Design of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABDesign of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABIJEEE
 
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...IJNSA Journal
 
Reduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed ImageReduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed ImageDr Sukhpal Singh Gill
 

Similar a Compression technique using dct fractal compression (20)

3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression
 
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
 
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
 
A Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWTA Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWT
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
Comparison and improvement of image compression
Comparison and improvement of image compressionComparison and improvement of image compression
Comparison and improvement of image compression
 
Comparison and improvement of image compression
Comparison and improvement of image compressionComparison and improvement of image compression
Comparison and improvement of image compression
 
Comparison and improvement of image compression
Comparison and improvement of image compressionComparison and improvement of image compression
Comparison and improvement of image compression
 
A spatial image compression algorithm based on run length encoding
A spatial image compression algorithm based on run length encodingA spatial image compression algorithm based on run length encoding
A spatial image compression algorithm based on run length encoding
 
Bp34412415
Bp34412415Bp34412415
Bp34412415
 
Jl2516751681
Jl2516751681Jl2516751681
Jl2516751681
 
Jl2516751681
Jl2516751681Jl2516751681
Jl2516751681
 
Maximizing Strength of Digital Watermarks Using Fuzzy Logic
Maximizing Strength of Digital Watermarks Using Fuzzy LogicMaximizing Strength of Digital Watermarks Using Fuzzy Logic
Maximizing Strength of Digital Watermarks Using Fuzzy Logic
 
Design of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABDesign of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLAB
 
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
 
Reduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed ImageReduction of Blocking Artifacts In JPEG Compressed Image
Reduction of Blocking Artifacts In JPEG Compressed Image
 
Jv2517361741
Jv2517361741Jv2517361741
Jv2517361741
 
Jv2517361741
Jv2517361741Jv2517361741
Jv2517361741
 

Más de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Más de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Compression technique using dct fractal compression

  • 1. Advances in Physics Theories and Applications www.iiste.org ISSN 2224-719X (Paper) ISSN 2225-0638 (Online) Vol 3, 2012 Compression Technique Using DCT & Fractal Compression – A Survey R M Goudar 1 * Priya Pise2* 1. Dept Of Computer , Maharashtra Academy Of Engg Alandi (D) ,Pune. 2. Dept Of IT , Indira College Of Engg , Parandwadi ,Tal- Maval ,Pune * E-mail of the corresponding author: rmgoudar66@gmail.com;priya.pise@gmail.com Abstract Steganography differs from digital watermarking because both the information and the very existence of the information are hidden. In the beginning, the fractal image compression method is used to compress the secret image, and then we encrypt this compressed data by DES.The Existing Steganographic approaches are unable to handle the Subterfuge attack i.e, they cannot deal with the opponents not only detects a message ,but also render it useless, or even worse, modify it to opponent favor. The advantage of BCBS is the decoding can be operated without access to the cover image and it also detects if the message has been tampered without using any extra error correction. To improve the imperceptibility of the BCBS, DCT is used in combination to transfer stego-image from spatial domain to the frequency domain. The hiding capacity of the information is improved by introducing Fractal Compression and the security is enhanced using by encrypting stego-image using DES. Keywords: Steganography, data hiding, fractal image compression, DCT. 1. Introduction One of the important application of data compression is image processing on digital images. It reduces the redundancy of image data to store it efficiently Multimedia data which is uncompressed (graphics ,audio , video ) need storage capacity & transmission bandwidth .Now a days there is rapid progress in mass storage density & digital communication system performance . The future of multimedia based web applications is data intensive , so we need to have efficient way to encode signal & images .Compression is achieved by the removal of one or more of three basic data redundancies: (1) Coding redundancy, which is present when less than optimal (i.e. the smallest length) code words are used(2) Interpixel redundancy, which results from correlations between the pixels of an image & (3) psycho visual redundancy which is due to data that is ignored by the human visual system (i.e. visually nonessential information).In this paper will mainly concentrate on the comparative study of compression techniques namely DCT (Discrete Cosine Transform) & Fractal Compression. 2. Review Of Compression Technique 2.1.DCT (Discrete Cosine Transform) : A discrete cosine transform (DCT) is a sequence of finitely many data points in terms of a sum of cosine functions oscillating at different frequencies. From lossy compression of audio and images to spectral methods for the numerical solution of partial differential equations , it turns out that cosine functions are much more efficient , whereas for differential equations the cosines express a particular choice of boundary conditions. Here is a block diagram explaining the same, followed by the decoding of the image. Fig 1 Encoding of DCT 9
  • 2. Advances in Physics Theories and Applications www.iiste.org ISSN 2224-719X (Paper) ISSN 2225-0638 (Online) Vol 3, 2012 Fig 2 Decoding of DCT 2.2. Fractal Compression: The method relies on the fact that in a certain images, parts of the image resemble other parts of the same image (self-similarity). But the computation time required to encode an image might be very long due to an exhaustive search for the optimal code. It is lossy image compression technique ,achieve high level of compression preserves the quality as of the original image . Its working is as shown in the figure 3. Start Partition the image into domain regions Choose a set of allowable range regions Choose a set of affine transformations will be considered when searching the best range Point to the first domain Compare image data with each possible range Point to first domain Is this a last domain ? Output a fractal file Stop Fig 3 Algorithm for fractal compression 10
  • 3. Advances in Physics Theories and Applications www.iiste.org ISSN 2224-719X (Paper) ISSN 2225-0638 (Online) Vol 3, 2012 3.Review of Compression Algorithms The techniques used to compress/decompress a single gray level image are expected to be easily modified to encode/ decode color images and image sequences . The goal of image compression is to save storage space and to reduce transmission time for image data. It aims at achieving a high compression ratio (CR) while preserving good fidelity of decoded images.. Recent compression methods can be briefly classified into four categories: (a) Wavelet, (b) JPEG/DCT, (c) VQ, and (d) Fractal methods, which are discussed by various people are briefly reviewed below. Chin-Chen Chang discussed [3] that proposed model does the data embedding into the cover image by changing the coefficients of a transform of an image such as discrete cosine transform. The high compression rate is one of the advantages of fractal image compression. Main advantage is the good image quality, after enough iteration for decompression. But the computation time required to encode an image might be very long due to an exhaustive search for the optimal code. And DES encryption is used to provide the security to the data, but it is unable to protect the Stego-Image from subterfuge attack. Which is nothing but , the attacker not only detect a message, but also render it useless or even worse, modify it to the opponent’s favor. K.B.Raja [4] has proposed a model which uses LSB ,but LSB provides poor security ,and DCT for converting objects in spatial domain to frequency domain. This model uses only raw Images because of subterfuge attack. The JPEG, BMP and GIF image formats, the header contains most of the image information. This leads to the problem of insecurity and therefore the payloads from such images can be easily identified. Hairong Qi discussed in [2] that in the proposed model the technique BCBS(Blind Consistency Based Steganography)is used .The advantage of the BCBS approach is that the decoding process can be operated blindly without access to the cover image, which enhances the imperceptibility. And that it not only decodes the message exactly, it also detects if the message has been tampered without using any extra error correction. The main drawback is the amount of data to hide is very less because he is selected only one row / Column to hide with one bit per pixel. And also the security is provided only for the Stego-Image not for the data that can be improved by using DES. Niels Provos [6] has found PSNR(Peak Signal To Noise Ratio) to be a good indicator of finger and face recognition matching scores in the case of JPEG2000 and SPIHT. Both wavelet-based algorithms perform exceptionally well in terms of rate-distortion performance and matching scores of all recognition systems considered. While PSNR exactly predicts the poor matching scores of fractal compression the case of fingerprint images, the relatively high PSNR results for face images suggest fractal compression to perform superior to JPEG for this biometric modality. The opposite is true – despite the low PSNR results, JPEG performs quite well in face recognition applications for high and medium bit rate applications Chin-Chen Chang [3] He has proposed a scheme to embed an image compressed via fractal image compression into the DCT domain of the cover image. Due to the high compression rate of fractal compression, also it can embed a secret image larger than the cover image itself. Moreover, the more decompression iterations will be done, the better decompressed secret image quality will get. Also, these compression codes of fractal compression must not be lost, or the embedded message cannot be extracted. Thus some modification on the bit streams of the modified coefficients to prevent the information loss caused by discrete cosine transformation. As for security, encrypt the compressed data via DES so that it can be prevent the eavesdroppers from getting the secret image. Chaur-Chin Chen [25] has only reviewed and summarized the characteristics of four up-to-date image coding algorithms based on Wavelet, JPEG/DCT, VQ, and Fractal approaches[5]. Experimental comparisons on four 256×256 commonly used images, Jet, Lenna, Mandrill, Peppers, and one 400×400 fingerprint image suggest a recipe described as follows. Any of the four approaches is satisfactory when the 0.5 bits per pixel (bpp) is requested. Hence for practical applications, he concluded that wavelet based compression algorithms are strongly recommended. 11
  • 4. Advances in Physics Theories and Applications www.iiste.org ISSN 2224-719X (Paper) ISSN 2225-0638 (Online) Vol 3, 2012 N. F. Johnson [22] brought the Tree Structured VQ techniques in order to decrease the table storage needed for en-coding and decoding along with unstructured vector quantization (UVQ) or Tree-Structured Vector Quantization (TSVQ). Particularly, a low-storage Secondary Quantizer is employed to squeeze the code vectors of the primary quantizer. The absolute benefits of uniform and non-uniform Secondary Quantization are examined. Quantization levels are put up on a binary or Quad tree structure (sub-optimal). It is to set vectors in different quadrant. Signs of vectors are only needed to be evaluated. This will reduce the number of links by 2^L for L-d vector problem. It will work fine for symmetric distribution According to Sachin Dhawan., [24] the hybrid VQ algorithm is explained as follows, first the correlation in the test image is taken away by wavelet transform. Wavelet transform is employed in the course of lifting scheme. The wavelet employed during lifting scheme is HAAR wavelet. Then it will lead with the primary level of decomposition gives way four components namely LL, LH, HL and HH correspondingly. Multistage VQ is implemented to LL band. The pointed coefficients in the sub band LH, HL and HH are pyramidal vector quantized by capturing vectors of stated measurement. Finally an entropy coding algorithm like Huffman coding is implemented as the final stage of the compression system to code the indices. He has proposed an algorithm groups the benefit of lessening of codebook searches and storage complexity which is intrinsic to MSVQ .Additionally pyramid vector quantization may not need great codebook storage having simple encoding and decoding algorithm. Hence high compression ratio can be accomplished by including PVQ along with MSVQ. 4. Measuring Compression Performances There are different criterion for measuring the performance of the compression also it depends on the nature of the application .When measuring the performance the main concern would be the space efficiency. The time efficiency is another factor. Since the compression behavior depends on the redundancy of symbols in the source file, it is difficulty to measure performance of a compression algorithm in general. The performance depends on the type and the structure of the input source. Additionally the compression behavior depends on the category of the compression algorithm: lossy or lossless. If a lossy compression algorithm is used to compress a particular source file, the space efficiency and time efficiency would be higher than that of the lossless compression algorithm. Thus measuring a general performance is difficult and there should be different measurements to evaluate the performances of those compression families. 4.1 Following are some measurements used to evaluate the performances of lossless algorithms. 1.Compression Ratio is the ratio between the size of the compressed file and the size of the source file. Compression Factor is the inverse of the compression ratio. That is the ratio between the size of the source file and the size of the compressed file. Saving Percentage calculates the shrinkage of the source file as a percentage. % size before compression saving percentage size before compression size after compression  All the above methods evaluate the effectiveness of compression algorithms using file sizes. There are some other methods to evaluate the performance of compression algorithms. Compression time, computational complexity and probability distribution are also used to measure the effectiveness. 2.Entropy This can be used, if the compression algorithm is based on statistical information of the source file. Self Information is the amount of one’s surprise evoked by an event. In another words, there can be two events: first one is an event which frequently happens and the other one is an event which rarely happens. If a message says that the second event happens, then it will generate more surprise in receivers mind than the first message. 3.Code Efficiency Average code length is the average number of bits required to represent a single code word. If the source and the lengths of the code words are known, the average code length can be calculated . 4. Bit Error Rate (BER): Here we compute the BER for two equal size images that is cover image and stego-image. BER is more accurate for error analysis when compared to MSE, because in BER we compute the actual number of bit positions which are replaced in the stego image , which is calculated by 12
  • 5. Advances in Physics Theories and Applications www.iiste.org ISSN 2224-719X (Paper) ISSN 2225-0638 (Online) Vol 3, 2012 m−1 H (e) = −∑ p(e i ) log 2 p(ei ) i=0 5. Mean square error (MSE): The MSE is computed by performing byte by byte comparisons of the two images, since a pixel is represented by 8 bits and hence 256 levels are available to represent the various gray levels. The MSE will result in a meaningful value only when each byte of an image is compared with the corresponding byte of another image. Let c and s be the cover image and stego-image respectively. Let n*n be the total number of pixels. The computation of MSE can be performed as follows, n −1 MSE= 1 ÷ n × n ∑ (c(i, j ) − s (i, j ) 2 i , j =0 Method Advantages Disadvantages Wavelet High -High Compression Ratio -Coefficient quantization Compression -State-Of-The-Art -Bit allocation -Coefficient(dct) quantization JPEG -Current Standard -Bit allocation -Simple decoder -Slow codebook generation VQ -No-coefficient quantization -Small bpp -Good mathematical Fractal -Slow Encoding -Encoding-frame Table 1 Comparisons of methods[24] 5. Conclusion Here after reviewed & summarizing the techniques of image compression ie, Wavelet, JPEG/ DCT,VQ, and Fractal approaches with the help of their experimental outcomes given by respective authors, so for practical approach we conclude that (1) Wavelet based compression algorithms are strongly recommended (2) DCT based approach might use an adaptive quantization table (3) VQ approach is not appropriate for a low bit rate compression although it is simple (4) Fractal approach should utilize its resolution-free decoding property for a low bit rate compression. References K.Munivara Prasad, V.Jyothsna,S.H.K.Raju, S.Indraneel (April2010) “High Secure Image Steganography in BCBS Using DCT and Fractal Compression” IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.4 Hairong Qi (2002) “Blind consistency based steganography for information hiding in digital media”, International Conference on Images Steganography. Chin-Chen Chang, Chi-Lung Chiang, and ,Ju-Yuan Hsiao(2005 ) “A DCT-domain System for Hiding Fractal Compressed Images” Proceedings of the 19th International Conference on Advanced Information Networking and Applications K.B.Raja, C.R.Chowdary, Venugopal K R, L.M.Patnaik (2005) “A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images ”International conference on Image and Signal Processing ,2005.N.F., 13
  • 6. Advances in Physics Theories and Applications www.iiste.org ISSN 2224-719X (Paper) ISSN 2225-0638 (Online) Vol 3, 2012 Johnson and ,Sushil Jajodia, Chaur-Chin Chen ( February 1998) “Exploring steganography, seeing the unseen,” IEEE Computer, pp. 26–34 Niels Provos, (December 2004)"A Secure Stegonographic Algorithm using LSB, DCT and Image Compression on Raw Images",Technical Report,Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore University R.Anderson and F. Petitcolas,(August 2001)"Defending against statistical steganalysis", In Proceedings of the 10th USENIX Security Symposium, pp. 323-335 Niels Provos, Peter Honeyman (May 1998) "On the limits of steganography" IEEE Journal of Selected Areas in Communications, Vol. 16, No. 4, , pp. 474-48 1. Tzschoppe, Robert Bauml, Johannes B.Huber, and Andre Kaup(2003 ) "Hide and Seek: An Introduction to Steganography," IEEE computer society, pp. 32-44. Roman. V,Santa, Clara, California,USA,(2003)“Steganographic System Based on Higher-Order Statistics”.Proceedings of SPIE Vol. 5020, Security and Watermarking of Multimedia Contents. Siwei Lyu, Hany Farid. LOW, S., MAXLMCHUK, K.F.. and O’GORMAN. (2006) “Steganalysis Using Higher-Order Image Statistics”. IEEE Transactions on Information Forensiscs and Security,Vol 1,NO.1,USA, BRASSIL, J.T. BENDER, W, GRUIIL, D , MOIIIMO IO, N . and LU, A (2006) ‘Fhtronic markinlr and identification techniuue to discouralre document copying’, IEEE WALTON,. Katzenbeisser and F. Petitcolas,( 2001.) ‘for data hiding’, ZBM $yrt. 1; 1996, 35. (3,4),p p. 313 330 IURNER, L.F.: ‘Digital data security system, Patent IPN Mi0 89’08915 4 Artech House (2000) Compute Information Hiding Techniques for Steganography and Digital Watermarking,. J. Fridrich, MARVEL, L.M., BONCELET, C.G., Jr., and RETTER, C.T ( , August 1999) ”Applications of data hiding in digital images,” in Tutorial for the ISSPA’99 Conference, Brisbane, Australia Siwei Lyu, Hany Farid. (2003)“Steganographic System Based on Higher-Order Statistics”.Proceedings of SPIE Vol. 5020, Security and Watermarking of Multimedia Contents V, Santa Clara, California, USA, 2003 BRASSIL, J.T., LOW, S., MAXLMCHUK, K.F.. and O’GORMAN. (2006)“Steganalysis Using Higher-Order Image Statistics”. IEEE Transactions on Information Forensiscs and Security,Vol 1,NO.1,USA MARVEL, L.M., BONCELET, C.G., Jr., and RETTER, C.T J. Fridrich, (August 1999)”Applications of data hiding in digital images,” in Tutorial for the ISSPA’99 Conference, Brisbane, Australia, , pp. 22-25. Aug 1999“Spread Spectrum Image Steganography”, IEEE trans. Image Process., 8(8), , pp.1075-1083 Fast Algorithm of the DCT and IDCT for VLSI Implementation Mong Ying Hou Zhaohuan Institute of Acoustics, Chinese Academy of Sciences A. K. Jain and U. Uludag. (2003) “Hiding biometric data”IEEE Trans. Pattern Analysis and Machine Intelligence, 25(11):1494–1498 N. F. Johnson and S. Katzenbeisser. (2008)“A survey of steganographic techniques, Information Hiding” Artech House, Norwood Y. Fisher, Editor, (1994.)“Fractal Image Compression: Theory and Applications”, Springer-Verlag, Sachin Dhawan Kurukshetra, Haryana, India,May (2011)A Review of Image Compression and Comparison of its Algorithms Deptt. of ECE, UIET, Kurukshetra University, Chaur-Chin Chen (2009) “On the Selection of Image Compression Algorithms “Department of Computer Science National Tsing Hua UniversityHsinchu 300, Taiwan 14