SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
INTERNATIONALComputer Engineering and Technology ENGINEERING
  International Journal of JOURNAL OF COMPUTER (IJCET), ISSN 0976-
  6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
                            & TECHNOLOGY (IJCET)

ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)                                                   IJCET
Volume 4, Issue 2, March – April (2013), pp. 17-22
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
                                                                        ©IAEME
www.jifactor.com




      A HIGH PERFORMANCE NOVEL IMAGE COMPRESSION
    TECHNIQUE USING HUFFMAN CODING WITH EDGE DECTION
              S.Anandanarayanan                                Dr.S.K.Srivatsa
               Research scholar                                Senior Professor
         Dr. M.G.R. Educational & Research             St.Josephs college of Engineering
              Institute University                             Chennai-600 025
                Madhuravoyal
              Chennai-600 095

  ABSTRACT

          Image compression can improve the performance of the digital systems by reducing
  time, cost in image storage and transmission without significant reduction of the image
  quality. This paper proposes a technique for image compression which uses Huffman coding
  is used to compress image then using Edge detection to identifying and locating sharp
  discontinuities in an image. There are large number of edge detection among them. The
  Canny edge detection is applied after Huffman coding. This technique is simple in
  implementation and utilizes less memory.

  Keywords: Edge Detection, Huffman coding, Canny edge detection.

  1. INTRODUCTION

           The image compression has become a necessity due to the demand of manipulation,
  storage and transmission of digital images, great efforts are made to seek image compression
  technique that are of modest complexity, exhibit efficient compression. Performance and
  provide scalability. A digital image is an array of real or complex numbers represented by a
  finite number of bits. It involves with the removal of redundant data. Compression is done by
  reducing video transmission bandwidth. It is referred as Bandwidth compression. Image
  compression is key technology in the field of video conferencing, remote sensing, Medical
  imaging, Facsimile Transmission, Military applications and space applications. Image
  compression is a mapping from a higher dimensional space to a lower dimensional space.




                                               17
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME

2. FUNDAMENTAL OF COMPRESSION

2.1 Types

      Lossless compression means no loss of image when compressing and also
decompressing. The reconstructed image after compression is same as the original one.
      Lossy compression means some image is lost when it is decompressed. In this
compression, a higher compression ratio can be achieved when compared to lossless
compression.

2.2 File compression

       The File compression is commonly used when sending a file from one computer to
another over a connection that has limited bandwidth. File compression makes the file
smaller and sending the file fast. When compressing a file and sending it to another computer
that computer has to have a program that will decompress the file. So it can be returned to
normal file.

2.3 Disk compression

    Disk compression software utility increases the amount of information that can be stored
on a hard disk drive of given size. Unlike a file compression utility which compresses only
specified files which requires the user designate the files to be compressed. When
information needs to be stored to the hard disk the utility will compress the information.
When information needs to be read, the utility will decompress the information.


3. EDGE DETECTION

    Edge detection is used in image analysis. There are so many techniques in the edge
detection. Edge detection is the process of identifying and locating sharp discontinuities in
an image. The discontinuities are abrupt changes in pixel intensity which characterise
boundaries of objects in it. Edge detection significantly reduces the amount of data and
filters out unwanted information, while preserving the structural properties in an image.

4. CODING TECHNIQUES

4.1 LZW

        LZW replaces strings of characters with single codes. These code that the LZW
algorithm outputs can be of any arbitrary length, but it must have more bits in it than a single
character.
Advantages
        It is easy to implement.
        Fast compression
        Lossless technique.
        Dictionary based technique.

                                              18
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME

Disadvantages
      Management of string table is difficult.
      Amount of storage needed is indeterminate.

Application
      It is used in TIFF and GIF files.

4.2 ARITHMETIC CODING

       The principles of arithmetic coding describe an arithmetic coding engine that will
produce a compliant bit stream when used in conjunction with the correct methods for
binarization and context selection [2].

Advantages
     Efficiently represents more frequently occurring sequences of pixels values with
     fewer bits.
     Reduce file size dramatically.
      Lossless compression.

Disadvantages
         It is a paid algorithm.
         Statistical technique.

Application
              It is used mostly for frequently occurring sequences of pixels.

4.3 RUN LENGTH CODING

       Run Length coding (RLE) is a simple technique to compress digital data by reducing
the physical size of a repeating string of characters. It also called as recurrence coding.

Example
            AAABBCC
            3A2B2C

Advantage
              Simple to implement.
              Fast to execute.
              Lossless compression.

Disadvantage
           Compression ratio is low as compared to other algorithms.

Application
               It is used mostly for TIFF, BMP and PCX files.




                                               19
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME

4.4 HUFFMAN CODING
 Huffman code procedure is based on the two observations [5].
       (a) More frequently occurred symbols will have shorter code words than symbol that occur
less frequently.
     (b) The two symbols that occur least frequently will have the same length.
                               Table 1. Huffman source Reduction
         Original source                                              Source reduction
   Symbol          Probability                     1           2            3             4
      a2                0.4                     0.4          0.4           0.4           0.6
      a6                0.3                     0.3          0.3           0.3           0.4
      a1                0.1                     0.1          0.2           0.3
      a4                0.1                     0.1          0.1
      a3               0.06                     0.1
      a5               0.04

                     Table 2. Huffman Code Assignment procedure
         Original source                                        source reduction
  Symbol   Probability Code         1            2                3             4
  a2        0.4           1      0.4 1        0.4 1          0.4    1       0.6 0
  a6         0.3         00     0.3 00       0.3 00          0.3 00         0.4 1
  a1         0.1         011    0.1 011      0.2 010          0.3 01
  a4         0.1         0100   0.1 0100     0.1 011
  a3        0.06       01010    0.1 0101
  a5         0.04      01011

         In the above table 1 the symbols are listed and corresponding symbol probabilities are
arranged in decreasing order. To form the first source reductions, the bottom two probabilities,
0.06 and 0.04 are combined to form a compound symbol with probability 0.1. This compound
symbol and its associated probability are placed in the first source reduction column so that the
probabilities of the reduced source are also ordered from the most to the least probable. This
process is then repeated until a reduced source with two symbols is reached. The second step if
Huffman’s procedure is a code each reduced source, starting with the smallest source and
working back to its original source. The minimal length binary code for a two symbol source, of
course, is the symbols 0 and 1.
         In the above table 2 these symbols are assigned to the two symbols on the right. As the
reduced source symbol with probabilities 0.6 was generated by combining two symbols in the
reduced source to its left, the 0 used to code it is now assigned to both of these symbols 0 and 1
are arbitrary appended to each to distinguish them from each other. This operation is then
repeated for each reduced source until the original course is reached. The final code appears at the
far left in the table 2. The average length of the code is given by the average of the product of
probability of the symbol and number of bits used to encode it. This is calculated below.
Lavg= (0.4) (1) + (0.3) (2) + (0.1) (3) + (0.1) (4) + (0.06) (5) + (0.04) (5) =2.2 bits/symbol and
the entropy of the source is 2.14 bits/symbol, the resulting Huffman code efficiency is
2.14/2.2=0.973
         Huffman’s procedure creates the optimal code for a set of symbols and probabilities
subject to the constraint that the symbols be coded one at a time.

                                                20
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME

 5. CANNY EDGE DETECTOR

       The current standard edge detection scheme widely used around the world is the
canny edge detector. This edge detector works in a multi-stage process. These processes are
smoothing, finding gradients, non-maximum suppression, double thresholding and Edge
tracking by hysterias. It using probability for finding error rate and also Improving signal
ratio.

6. THE PROPOSED ALGORITHM

       The proposed scheme combines Huffman coding with Edge detection. The steps
given below.

Step 1: Read the image on to the workspace of the mat lab.
Step 2: Convert the given colour image into grey level image.
Step 3: Call a function which will find the symbol whose pixel value does not repeated.
Step 4: Call a function which will calculate the probability of each symbol.
Step 5: Probability of symbols are arranged in decreasing order then lower probabilities are
merged till two probabilities are left.
Step 6: Codes are assigned according to rule that the highest probable symbol will have a
shorter
 Length probable will have a shorter length code then Huffman encoding is performed.
Step 7: Smooth the image with a Gaussian filter.
Step 8: Compute the gradient magnitude and angle image.
Step 9: Apply non-maxima suppression to the gradient magnitude image.
Step 10: Use double thresholding and connectivity analysis to detect and link edges.


7. RESULT




                 INPUT IMAGE                   OUTPUT IMAGE


8. CONCLUSION

         We have presented new method of compression by applying Huffman Coding with
Edge detection. From the output, it is concluded that this method is more efficient than the
traditional method. This method gives identifying and locating sharp discontinuities in this
compressed image. As a future work more shall be on improvement of new technique in Edge
detection.
                                            21
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME

9.REFERENCES

[1] Fari Muhammad Abubakar, “Study of Image segmentation by using Edge detection
techniques”, Vol-1, issue 9, Nov-2012.
[2] Tmt.Nishat kanvel and Dr.Elwin Chandra monie, “Performance Measure of Different
Wavelet for a shuffled image compression scheme”,IJCSNS,vol 9,No 3,March 2009.
[3] Mamta Sharma,”Compression using Huffman coding” IJCSNS,vol 10, No 5,May 2010.
[4] Jagadish H.Pujar and Lahit M.Kalaskar, “A new lossless method of image compression
and Decompression using Huffman coding techniques”, Journal of theoretical and applied
Information Technology”.
[5] Compression using Fractional Fourier Transform. A Thesis submitted in the partial
fulfilment of requirement for the award of the degree of Master of Engineering in Electronics
and Communication by parvinder kaur.
[6] Visalia G.Dubey,Jaspal singh,”3D Medical Image Compression using Huffman Encoding
Technique”. International Journal of scientific and research publications,vol 2,issue 9,sep
2010.
[7] R.Muthukrishnan and M.Radha,”Edge detection for image segmentation”, International
journal of computer science and information Tech,Dec 2011.
[8] C.Saravan,and M.Surender,“ Enhancing efficiency of Huffman coding using Lempel Ziv
coding for Image compression”.International journal of soft computing and Engineering,vol-
2,issue 6,Jan 2013.
[9] Mridul kumar Mathur,Seema Loonker and Dr.Dheeraj saxeena,”Lossless Huffman
coding Technique for image compression and Reconstruction using Binary trees”,
IJCTA,Appl,vol 3(1), Jan-Feb 2012.
[10] S.Lakshmi and Dr.V.Sankaranarayanan,”A Study of Edge detection techniques for
segmentation Computing approaches”,Computer aided soft computing techniques for
imaging and Biomedical Application.
[11] Hitashi and Sugandha Sharma, “Fractal Image Compression Scheme using
Biogeography Based Optimization on Color Images” International journal of
Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 35 - 46,
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375, Published by IAEME.
[12] P. Prasanth Babu, L.Rangaiah and D.Maruthi Kumar, “Comparison and Improvement of
Image Compression Using DCT, DWT & Huffman Encoding Techniques” International
journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013,
pp. 54 - 60, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375, Published by IAEME.




                                             22

Más contenido relacionado

Similar a A high performance novel image compression technique using huffman coding

Computer Graphics & Visualization - 06
Computer Graphics & Visualization - 06Computer Graphics & Visualization - 06
Computer Graphics & Visualization - 06Pankaj Debbarma
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreLuisa Francisco
 
Sunzip user tool for data reduction using huffman algorithm
Sunzip user tool for data reduction using huffman algorithmSunzip user tool for data reduction using huffman algorithm
Sunzip user tool for data reduction using huffman algorithmDr Sandeep Kumar Poonia
 
Image compression using negative format
Image compression using negative formatImage compression using negative format
Image compression using negative formateSAT Journals
 
Image compression using negative format
Image compression using negative formatImage compression using negative format
Image compression using negative formateSAT Publishing House
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueIRJET Journal
 
A Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image CompressionA Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image CompressionEditor IJMTER
 
An efficient hash based steganography technique for text message using col
An efficient hash based steganography technique for text message using colAn efficient hash based steganography technique for text message using col
An efficient hash based steganography technique for text message using colIAEME Publication
 
Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)nes
 
VII Compression Introduction
VII Compression IntroductionVII Compression Introduction
VII Compression Introductionsangusajjan
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &IAEME Publication
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &IAEME Publication
 
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...ijsrd.com
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...IAEME Publication
 

Similar a A high performance novel image compression technique using huffman coding (20)

Computer Graphics & Visualization - 06
Computer Graphics & Visualization - 06Computer Graphics & Visualization - 06
Computer Graphics & Visualization - 06
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compre
 
Sunzip user tool for data reduction using huffman algorithm
Sunzip user tool for data reduction using huffman algorithmSunzip user tool for data reduction using huffman algorithm
Sunzip user tool for data reduction using huffman algorithm
 
Image compression using negative format
Image compression using negative formatImage compression using negative format
Image compression using negative format
 
Image compression using negative format
Image compression using negative formatImage compression using negative format
Image compression using negative format
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
 
A Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image CompressionA Critical Review of Well Known Method For Image Compression
A Critical Review of Well Known Method For Image Compression
 
An efficient hash based steganography technique for text message using col
An efficient hash based steganography technique for text message using colAn efficient hash based steganography technique for text message using col
An efficient hash based steganography technique for text message using col
 
Image compression
Image compressionImage compression
Image compression
 
Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)
 
Compressionbasics
CompressionbasicsCompressionbasics
Compressionbasics
 
VII Compression Introduction
VII Compression IntroductionVII Compression Introduction
VII Compression Introduction
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
 
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
 
Innovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction CodesInnovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction Codes
 
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
 

Más de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Más de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

A high performance novel image compression technique using huffman coding

  • 1. INTERNATIONALComputer Engineering and Technology ENGINEERING International Journal of JOURNAL OF COMPUTER (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) IJCET Volume 4, Issue 2, March – April (2013), pp. 17-22 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) ©IAEME www.jifactor.com A HIGH PERFORMANCE NOVEL IMAGE COMPRESSION TECHNIQUE USING HUFFMAN CODING WITH EDGE DECTION S.Anandanarayanan Dr.S.K.Srivatsa Research scholar Senior Professor Dr. M.G.R. Educational & Research St.Josephs college of Engineering Institute University Chennai-600 025 Madhuravoyal Chennai-600 095 ABSTRACT Image compression can improve the performance of the digital systems by reducing time, cost in image storage and transmission without significant reduction of the image quality. This paper proposes a technique for image compression which uses Huffman coding is used to compress image then using Edge detection to identifying and locating sharp discontinuities in an image. There are large number of edge detection among them. The Canny edge detection is applied after Huffman coding. This technique is simple in implementation and utilizes less memory. Keywords: Edge Detection, Huffman coding, Canny edge detection. 1. INTRODUCTION The image compression has become a necessity due to the demand of manipulation, storage and transmission of digital images, great efforts are made to seek image compression technique that are of modest complexity, exhibit efficient compression. Performance and provide scalability. A digital image is an array of real or complex numbers represented by a finite number of bits. It involves with the removal of redundant data. Compression is done by reducing video transmission bandwidth. It is referred as Bandwidth compression. Image compression is key technology in the field of video conferencing, remote sensing, Medical imaging, Facsimile Transmission, Military applications and space applications. Image compression is a mapping from a higher dimensional space to a lower dimensional space. 17
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 2. FUNDAMENTAL OF COMPRESSION 2.1 Types Lossless compression means no loss of image when compressing and also decompressing. The reconstructed image after compression is same as the original one. Lossy compression means some image is lost when it is decompressed. In this compression, a higher compression ratio can be achieved when compared to lossless compression. 2.2 File compression The File compression is commonly used when sending a file from one computer to another over a connection that has limited bandwidth. File compression makes the file smaller and sending the file fast. When compressing a file and sending it to another computer that computer has to have a program that will decompress the file. So it can be returned to normal file. 2.3 Disk compression Disk compression software utility increases the amount of information that can be stored on a hard disk drive of given size. Unlike a file compression utility which compresses only specified files which requires the user designate the files to be compressed. When information needs to be stored to the hard disk the utility will compress the information. When information needs to be read, the utility will decompress the information. 3. EDGE DETECTION Edge detection is used in image analysis. There are so many techniques in the edge detection. Edge detection is the process of identifying and locating sharp discontinuities in an image. The discontinuities are abrupt changes in pixel intensity which characterise boundaries of objects in it. Edge detection significantly reduces the amount of data and filters out unwanted information, while preserving the structural properties in an image. 4. CODING TECHNIQUES 4.1 LZW LZW replaces strings of characters with single codes. These code that the LZW algorithm outputs can be of any arbitrary length, but it must have more bits in it than a single character. Advantages It is easy to implement. Fast compression Lossless technique. Dictionary based technique. 18
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME Disadvantages Management of string table is difficult. Amount of storage needed is indeterminate. Application It is used in TIFF and GIF files. 4.2 ARITHMETIC CODING The principles of arithmetic coding describe an arithmetic coding engine that will produce a compliant bit stream when used in conjunction with the correct methods for binarization and context selection [2]. Advantages Efficiently represents more frequently occurring sequences of pixels values with fewer bits. Reduce file size dramatically. Lossless compression. Disadvantages It is a paid algorithm. Statistical technique. Application It is used mostly for frequently occurring sequences of pixels. 4.3 RUN LENGTH CODING Run Length coding (RLE) is a simple technique to compress digital data by reducing the physical size of a repeating string of characters. It also called as recurrence coding. Example AAABBCC 3A2B2C Advantage Simple to implement. Fast to execute. Lossless compression. Disadvantage Compression ratio is low as compared to other algorithms. Application It is used mostly for TIFF, BMP and PCX files. 19
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 4.4 HUFFMAN CODING Huffman code procedure is based on the two observations [5]. (a) More frequently occurred symbols will have shorter code words than symbol that occur less frequently. (b) The two symbols that occur least frequently will have the same length. Table 1. Huffman source Reduction Original source Source reduction Symbol Probability 1 2 3 4 a2 0.4 0.4 0.4 0.4 0.6 a6 0.3 0.3 0.3 0.3 0.4 a1 0.1 0.1 0.2 0.3 a4 0.1 0.1 0.1 a3 0.06 0.1 a5 0.04 Table 2. Huffman Code Assignment procedure Original source source reduction Symbol Probability Code 1 2 3 4 a2 0.4 1 0.4 1 0.4 1 0.4 1 0.6 0 a6 0.3 00 0.3 00 0.3 00 0.3 00 0.4 1 a1 0.1 011 0.1 011 0.2 010 0.3 01 a4 0.1 0100 0.1 0100 0.1 011 a3 0.06 01010 0.1 0101 a5 0.04 01011 In the above table 1 the symbols are listed and corresponding symbol probabilities are arranged in decreasing order. To form the first source reductions, the bottom two probabilities, 0.06 and 0.04 are combined to form a compound symbol with probability 0.1. This compound symbol and its associated probability are placed in the first source reduction column so that the probabilities of the reduced source are also ordered from the most to the least probable. This process is then repeated until a reduced source with two symbols is reached. The second step if Huffman’s procedure is a code each reduced source, starting with the smallest source and working back to its original source. The minimal length binary code for a two symbol source, of course, is the symbols 0 and 1. In the above table 2 these symbols are assigned to the two symbols on the right. As the reduced source symbol with probabilities 0.6 was generated by combining two symbols in the reduced source to its left, the 0 used to code it is now assigned to both of these symbols 0 and 1 are arbitrary appended to each to distinguish them from each other. This operation is then repeated for each reduced source until the original course is reached. The final code appears at the far left in the table 2. The average length of the code is given by the average of the product of probability of the symbol and number of bits used to encode it. This is calculated below. Lavg= (0.4) (1) + (0.3) (2) + (0.1) (3) + (0.1) (4) + (0.06) (5) + (0.04) (5) =2.2 bits/symbol and the entropy of the source is 2.14 bits/symbol, the resulting Huffman code efficiency is 2.14/2.2=0.973 Huffman’s procedure creates the optimal code for a set of symbols and probabilities subject to the constraint that the symbols be coded one at a time. 20
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 5. CANNY EDGE DETECTOR The current standard edge detection scheme widely used around the world is the canny edge detector. This edge detector works in a multi-stage process. These processes are smoothing, finding gradients, non-maximum suppression, double thresholding and Edge tracking by hysterias. It using probability for finding error rate and also Improving signal ratio. 6. THE PROPOSED ALGORITHM The proposed scheme combines Huffman coding with Edge detection. The steps given below. Step 1: Read the image on to the workspace of the mat lab. Step 2: Convert the given colour image into grey level image. Step 3: Call a function which will find the symbol whose pixel value does not repeated. Step 4: Call a function which will calculate the probability of each symbol. Step 5: Probability of symbols are arranged in decreasing order then lower probabilities are merged till two probabilities are left. Step 6: Codes are assigned according to rule that the highest probable symbol will have a shorter Length probable will have a shorter length code then Huffman encoding is performed. Step 7: Smooth the image with a Gaussian filter. Step 8: Compute the gradient magnitude and angle image. Step 9: Apply non-maxima suppression to the gradient magnitude image. Step 10: Use double thresholding and connectivity analysis to detect and link edges. 7. RESULT INPUT IMAGE OUTPUT IMAGE 8. CONCLUSION We have presented new method of compression by applying Huffman Coding with Edge detection. From the output, it is concluded that this method is more efficient than the traditional method. This method gives identifying and locating sharp discontinuities in this compressed image. As a future work more shall be on improvement of new technique in Edge detection. 21
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 9.REFERENCES [1] Fari Muhammad Abubakar, “Study of Image segmentation by using Edge detection techniques”, Vol-1, issue 9, Nov-2012. [2] Tmt.Nishat kanvel and Dr.Elwin Chandra monie, “Performance Measure of Different Wavelet for a shuffled image compression scheme”,IJCSNS,vol 9,No 3,March 2009. [3] Mamta Sharma,”Compression using Huffman coding” IJCSNS,vol 10, No 5,May 2010. [4] Jagadish H.Pujar and Lahit M.Kalaskar, “A new lossless method of image compression and Decompression using Huffman coding techniques”, Journal of theoretical and applied Information Technology”. [5] Compression using Fractional Fourier Transform. A Thesis submitted in the partial fulfilment of requirement for the award of the degree of Master of Engineering in Electronics and Communication by parvinder kaur. [6] Visalia G.Dubey,Jaspal singh,”3D Medical Image Compression using Huffman Encoding Technique”. International Journal of scientific and research publications,vol 2,issue 9,sep 2010. [7] R.Muthukrishnan and M.Radha,”Edge detection for image segmentation”, International journal of computer science and information Tech,Dec 2011. [8] C.Saravan,and M.Surender,“ Enhancing efficiency of Huffman coding using Lempel Ziv coding for Image compression”.International journal of soft computing and Engineering,vol- 2,issue 6,Jan 2013. [9] Mridul kumar Mathur,Seema Loonker and Dr.Dheeraj saxeena,”Lossless Huffman coding Technique for image compression and Reconstruction using Binary trees”, IJCTA,Appl,vol 3(1), Jan-Feb 2012. [10] S.Lakshmi and Dr.V.Sankaranarayanan,”A Study of Edge detection techniques for segmentation Computing approaches”,Computer aided soft computing techniques for imaging and Biomedical Application. [11] Hitashi and Sugandha Sharma, “Fractal Image Compression Scheme using Biogeography Based Optimization on Color Images” International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 35 - 46, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375, Published by IAEME. [12] P. Prasanth Babu, L.Rangaiah and D.Maruthi Kumar, “Comparison and Improvement of Image Compression Using DCT, DWT & Huffman Encoding Techniques” International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 54 - 60, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375, Published by IAEME. 22