SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
503
DEVELOPING AND COMPARING AN ENCODING SYSTEM USING
VECTOR QUANTIZATION & EDGE DETECTION
Ms. SONALI MEGHARE & Prof. ROSHANI TALMALE
Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of
Engineering, RTMNU, Nagpur
ABSTRACT
Developing and comparing an encoding system using VQ and edge detection gives a
real-time image coding. The edge detection gives the result that the compression is perfect on
the basis of finding the edges of the compressed video. The comparison gives the better result
than the existing Haar transform with respect to time. The compression ratio is get increased
using downsample method as compared to Haar transform. Downsample method also gives
the better edge detection than Haar transform. The encoding process applied is independent
of the vector dimensions and does not perform any arithmetic operations. The decision tree
generated by an offline process. Together with pipeline architecture, high speed encoding is
now realizable in a single Chip. A new systolic architecture to realize the encoder of full-
search vector quantization (VQ) for high-speed applications.
INTRODUCTION
Recently a new interest has been arisen in the field of the very low bit rate video
application. The motivation of this new interest lies in the development of new applications
such as videophones, video conferencing, and many others. The major requirements for these
applications are the low capacity for transmission and storage, in order to use the existing
Public Switched Telephone Networks (PSTN) or mobile channels numerous algorithms have
been explored to implement the high compression system, such as model based and object-
based methods. The advent of multimedia has evidenced a merger of computer technology
and television technology. This merger has resulted in the emergence of several applications
such as teleconferencing, videophone and video-on-demand. These applications would not be
possible without an efficient video compression algorithm. Several international
standardization activities are aiming at developing high performance video compression
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 3, May-June (2013), pp. 503-511
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
504
techniques for different applications, e.g. H.261 for video conferencing, MPEGI for CD-
ROM based applications, MPEG2 for broadcast TV etc. Currently the MPEG standardization
group has started an investigative effort towards developing a standard (currently referred to
as MPEG4) for low bit rate video compression. VQ has been considered as an efficient block-
based lossy compression technique. Edge detection provides information on an object’s edge
transitions instead of a full picture of the object.
RELATED WORK
Work done in the area of edge detection and vector quantization is reviewed and focus
has been made on detecting the edges of the digital images. Edge detection is a problem of
fundamental importance in image analysis. In typical images, edges characterize object
boundaries and are therefore useful for segmentation, registration, and identification of
objects in a scene. Edge detection of an image reduces significantly the amount of data and
filters out information that may be regarded as less relevant, preserving the important
structural properties of an image.
OVERVIEW OF VECTOR QUANTIZATION
Quantization is used to reduced the total number of bits needed for a compressed image.
Scalar Quantization:
Maps one sample of input signal to one quantized output.
Vector Quantization:
Set of input Data to single codeword.
Vector quantization is a classical quantization technique from signal processing which allows
the modeling of probability density functions by the distribution of prototype vectors. It was
originally used for data compression. It works by dividing a large set of points (vectors) into
groups having approximately the same number of points closest to them. Each group is
represented by its centroid point; The density matching property of vector quantization is
powerful, especially for identifying the density of large and high-dimensioned data. Since
data points are represented by the index of their closest centroid, commonly occurring data
have low error, and rare data high error. This is why VQ is suitable for lossy data
compression. It can also be used for lossy data correction and density estimation. Vector
quantization, also called "block quantization" or "pattern matching quantization" is often used
in lossy data compression. It works by encoding values from a multidimensional vector space
into a finite set of values from a discrete subspace of lower dimension. A lower-space vector
requires less storage space, so the data is compressed. Due to the density matching property
of vector quantization, the compressed data have errors that are inversely proportional to their
density
Overview of Edge Detection
Edge detection refers to the process of identifying and locating sharp discontinuities
in an image. The discontinuities are abrupt changes in pixel intensity which characterize
boundaries of objects in a scene.Edge detecting an image significantly reduces the amount of
data and filters out useless information, while preserving the important structural properties
in an image.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
505
Canny Edge Detector
Edges characterize boundaries and are therefore a problem of fundamental importance
in image processing. list of criteria to improve current methods of edge detection.
The first and most obvious is low error rate. It is important that edges occurring in images
should not be missed and that there be NO responses to non-edges.
The second criterion is that the edge points be well localized. In other words, the distance
between the edge pixels as found by the detector and the actual edge is to be at a minimum.
A third criterion is to have only one response to a single edge. This was implemented
because the first 2 were not substantial enough to completely eliminate the possibility of
multiple responses to an edge.
Low Bit Rate Picture Coding
Very low bit rate image coding is an important problem regarding applications such
as storage on low memory devices or streaming data on the internet. The state of the art in
image compression is to use 2D wavelets. The advantages of wavelet base multiscale nature
and in their ability to separtly present functions that are Piecewise smooth.Their main
problem on the other hand, is that in 2D wavelets are not able to deal with the natural
geometry of images, i.e they cannot separately represent objects that are smooth away from
regular sub manifolds ability to present functions that are piecewise smooth. Their main
problem on the other hand, is that in 2D wavelets are not able to deal with the natural
geometry of images, i.e they cannot sparsely represent objects that are smooth away from
regular sub manifolds
Object Extraction
Enables structured object based coding at different bit streams , and Vector Quantizer
is to encode blocks by simple numbering. The block-based coding has been conventionally
employed by a number of picture coding algorithms such as MPEG1/2, H.263, etc. However,
usually the edges of an object in a picture spread over numbers of blocks. This is the reason
why the block-based coding causes the so-called block distortion in coded images which
considerably degrades the picture quality. To overcome this drawback of the block-based
coding, the object-based coding is adopted so that at the subsequent stage the objects in a
picture can be classified into a number of groups according to their motions and sizes.
Motion Compensator
A motion compensator is a device that decreases the undesirable effects of the relative
motion between two connected objects. Motion compensators are usually placed between a
floating object and a more stationary object, such as a vessel or a structure fixed to the
seabed. The motion compensator does not prevent the motion, but tries to eliminate the
negative effects of the movement.
Geometric Vector Quantization
Geometric Vector Quantization (GVQ), is one type of product vector quantization
methods, in this method the code vectors are inspired by edge related features of the high-
frequency sub bands. The code vectors for a two-level GVQ that we used are composed of
binary-valued blocks reflecting the basic shapes found in the upper sub bands and two locally
adapted intensity values, which indicate minimum and maximum intensities for each coded
block.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
506
System Flow for Image
Basic step for Simulation of a Image
Initially generate Do image file in MATLAB
Run Do file in MATLAB
Enter the name of entity in MATLAB
Select the path for input image in MATLAB in temporary folder
Create new project in modelsim
Run VHDL file
After compiling the VHDL code generate Text file
Run Text file then generate matrix
Put the matrix in MATLAB command window
Run the matrix to get the output result
Result of Vector Quantization using image
Fig 1. Input Image
After giving input image in matlab. Import this do file in modelsim for applying VQ and
generate the text file for this input video.
Fig 2. Text matrix for image
After creating the text file copy the text matrix in command window of matlab and run the
file.
Fig 3. Output Result of compress image
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
507
Result Of Edge Detection
Fig 4. Original image
Fig 5. Result of edge detection by Canny Operator on Image
System Flow for Video
Initially generate Do Video file in MATLAB
Run Do video file in MATLAB
Enter the name of entity in MATLAB
Enter number of frames to be extracted Select the path for input Video in MATLAB
in temporary folder Create new project in modelsim Run VHDL file
After compiling the VHDL code generate Text file
Run Text file then generate matrix
Put the matrix in MATLAB command window
Run the matrix to get the output result
Result of Vector Quantization and Edge detection using Video
Fig 6. Input video
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
508
Initially create Do file in Matlab. For creating the do file firstly enter the name of entity
that must be match with the entity name of the modelsim. Eg. the entity name in modelsim
is E_LowBitRateEncoding. This entity name is gives in single quotation. Eg.
‘E_LowBitRateEncoding’.
Fig 7. Input frames in modelsim
After giving the do file in modelsim the input frames is done in binary format.
Fig 8. Matrix for input video
After copying the text file in matlab window then run the video player for view the output
compressed video
Fig 9. Output Compressed video
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
509
Fig 10. Edge detection of compressed video
Result of compressed video using Haar Transform
Comparisons between Haar and Downsample method with respect to time and
compression ratio
Video Time Compression Ratio
Downsample aamir 2 us 94.67%
Haar aamir 1.58 s 75%
Downsample Flower 6 us 99.67%
Haar Flower 10.75 s 75%
Downsample Car 15 us 94.67%
Haar Car 12.81 s 75%
Downsample Man 12 us 94.67%
Haar Man 12.81 s 75%
Downsample Traffic 9 us 78.67%
Haar Traffic 8.38 s 75%
Haar aamir 1.58 s 75%
From the table and the output of the videos it has been cleared that the compression
quality of the downsample method is much good compared with the Haar transform and the
compression ratio also get increased. The edge detection part is also done very accurately in
the downsample method.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
510
CONCLUSION
This paper contain Vector Quantization used for lossy data compression, lossy data
correction, and coding parts. it also measure image compression ratio with specified
extracting number of frame which have been selected by input image with image size by
generating text matrix in VHDL run at MATLAB command window. This paper also
describes an edge detection technique which recognize the edges of an image to show that
compression is perfect.
REFERENCES
[l] “A very low bit rate video coding system using adaptive region classified vector
quantization”, National Taiwan University, by Yee-Wen Chen and Mei-Juan chen.
[2] ”Low bit-rate video streaming for face to face teleconference”, by Zhen Wen and
Tomas Huang.
[3] F. Bartolini, V. Cappellini, A. Mecocci, and R. Vagheggi: “A segmentation-based
motion compensated scheme for low-bit video coding”.
[4] Journal of Information Hiding and Multimedia Signal Processing © 2010 ISSN 2073-
4212, by Zhe-Ming Ln
[5] Chanyul kim and Noel E. O’Connor “Low complexity video compression using
moving edge detection based on DCT coefficients”
[6] International Journal of Recent trends in engineering, vol, 1, No. 2, May 2009 on
“edge detection techniques for image segmentation of soft computing approaches”.
[7] University of Strathclyde, U.K., by the GEC Marconi Hirst Research centre by Stathis
P.Voukelatos and John J. Soraghan on “very low bit rate color video coding using
vector quantization”.
[8] International Journal of Image Processing by Raman maini and Dr.Himanshu
Aggarwal on “Study and coparision of various Image edge detection techniques”
[9] N.S. Jayant, P. Noll, Digital Coding of Waveform,Principle and Application to Speech
and Video ,Prentice-Hall
[10] G. Karlsson and M. Vetterli, “Subband Coding ofVideo Signals for Packet Switched
Networks,”Proceeding of SPIE Conf. on visual communicationand image processing
11, Vol. 845, Cambridge, MA
[11] Z. Li and Z. M. Lu, Fast code vector search scheme for 3D mesh model vector
quantization,IETElectronics Letters, vol. 44, no. 2, pp. 104–105, 2008
[12] Z. M. Lu and Z. Li, Dynamically restricted codebook based vector quantization
scheme for mesh geometry compression” Signal, Proc. of Image and Video
Processing, vol. 2, no. 3 pp. 251–260, 2008.
[13] Z. M. Lu and H. Pei, Hybrid Image Compression Scheme Based on PVQ and
DCTVQ,IEICE Trans.Information and Systems, vol. E88-D, no. 10, pp. 2422–2426,
2005.
[14] Raman Maini and J. S. Sobel, "Performance Evaluation of Prewitt Edge Detector for
Noisy Images", GVIP Journal, Vol. 6, Issue 3, December 2006
[15] Li Dong Zhang; Du Yan Bi; "An improved morphological gradient edge detection
algorithm”, Communications and Information Technology, ISCIT 2005.
IEEEInternational Symposium on Volume 2, (s):1280 – 1283, 12-14 Oct. 2005.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
511
[16] B. Yang, Z. M. Lu, D. G. Xu, and S. H. Sun, Neighboring pixels based low complexity
predictive vector quantization algorithms for image coding, ACTA ELECTRONICA
SINICA, vol. 31, no. 5, pp. 707–710, 2003
[17] Rital, S.; Bretto, A.; Cherifi, H.; Aboutajdine, D.; combinatorial edge detection
algorithm on noise images", Video/Image Processing and Multimedia Communications
4thEURASIPIEEE Region 8 International Symposium on VIPromCom, (s):351 – 355,
16-19 June 2005.
[18] Gonzalez, R and Woods, R., "Digital Image Processing" 2/E, Prentice Hall Publisher,
2002
[19] Zhao Yu-qian; Gui Wei-hua; ChenZhen-cheng; Tang Jing-tian; Li Ling-yun; "Medical
Images Edge Detection Based on Mathematical Morphology" Engineering in Medicine
and Biology Society, IEEE-EMBS. 27th Annual International Conference, (s):6492 –
6495, 01- 04 Sept. 2004.
[20] S. A. Rizvi and N. M. Nasrabadi, Predictive residual vector quantization, IEEE Trans.
Image Processing, vol. 4, no. 11, pp. 1482–1495, 2003.
[21] P. Gerken,” Object-Based Analysis-Synthesis Coding of Image Sequences at Very
Low Bit Rates,” IEEE Trans. on Circuits and Systems for Video Tech.pp. 228-235
,June 2001.
[22] C. S. Choi and K.Aizawa,” Analysis and Synthesis of Facial Image Sequences in
Model-Based Image Coding,” IEEE Trans. on Circuits and Systems for Video Tech.
pp. 257-275 ,June 2001.
[23] Y. Linde, A. Buzo and R.M. Gray, ” An algorithm for vector quantizer design,”IEEE
Trans.Commun,Vol. COM-28, pp. 84-95, January 2001
[24] J. Canny, A computational approach to edge detection. IEEE Transactions on Pattern
Analysis and Machine Intelligence PAMI-8 6 2000,
[25] S.Anandanarayanan and Dr.S.K.Srivatsa, “A High Performance Novel Image
Compression Technique using Huffman Coding with Edge Dection”, International
Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013,
pp. 17 - 22, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[26] R. Pushpavalli and G.Sivaradje, “Nonlinear Filtering Technique for Preserving Edges
and Fine Details of Digital Images”, International Journal of Electronics and
Communication Engineering & Technology (IJECET), Volume 3, Issue 1, 2012,
pp. 29 - 40, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.

Más contenido relacionado

La actualidad más candente

Dj31514517
Dj31514517Dj31514517
Dj31514517IJMER
 
Maximizing Strength of Digital Watermarks Using Fuzzy Logic
Maximizing Strength of Digital Watermarks Using Fuzzy LogicMaximizing Strength of Digital Watermarks Using Fuzzy Logic
Maximizing Strength of Digital Watermarks Using Fuzzy Logicsipij
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
 
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...MDABDULMANNANMONDAL
 
A130104
A130104A130104
A130104irjes
 
Review paper on segmentation methods for multiobject feature extraction
Review paper on segmentation methods for multiobject feature extractionReview paper on segmentation methods for multiobject feature extraction
Review paper on segmentation methods for multiobject feature extractioneSAT Journals
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
Visible watermarking using spread spectrum
Visible watermarking using spread spectrumVisible watermarking using spread spectrum
Visible watermarking using spread spectrumIAEME Publication
 
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET -  	  An Robust and Dynamic Fire Detection Method using Convolutional N...IRJET -  	  An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...IRJET Journal
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...ijma
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques IJECEIAES
 

La actualidad más candente (15)

Dj31514517
Dj31514517Dj31514517
Dj31514517
 
Maximizing Strength of Digital Watermarks Using Fuzzy Logic
Maximizing Strength of Digital Watermarks Using Fuzzy LogicMaximizing Strength of Digital Watermarks Using Fuzzy Logic
Maximizing Strength of Digital Watermarks Using Fuzzy Logic
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
 
G017444651
G017444651G017444651
G017444651
 
A130104
A130104A130104
A130104
 
Review paper on segmentation methods for multiobject feature extraction
Review paper on segmentation methods for multiobject feature extractionReview paper on segmentation methods for multiobject feature extraction
Review paper on segmentation methods for multiobject feature extraction
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
Geometric Deep Learning
Geometric Deep Learning Geometric Deep Learning
Geometric Deep Learning
 
L026070074
L026070074L026070074
L026070074
 
Visible watermarking using spread spectrum
Visible watermarking using spread spectrumVisible watermarking using spread spectrum
Visible watermarking using spread spectrum
 
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET -  	  An Robust and Dynamic Fire Detection Method using Convolutional N...IRJET -  	  An Robust and Dynamic Fire Detection Method using Convolutional N...
IRJET - An Robust and Dynamic Fire Detection Method using Convolutional N...
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques
 
K42016368
K42016368K42016368
K42016368
 

Destacado

Decentralized stabilization of a class of large scale linear interconnected
Decentralized stabilization of a class of large scale linear interconnectedDecentralized stabilization of a class of large scale linear interconnected
Decentralized stabilization of a class of large scale linear interconnectedIAEME Publication
 
Experience on using total station surveying for mapping and contouring
Experience on using total station surveying for mapping and contouringExperience on using total station surveying for mapping and contouring
Experience on using total station surveying for mapping and contouringIAEME Publication
 
Optimization of supply chain logistics cost
Optimization of supply chain logistics costOptimization of supply chain logistics cost
Optimization of supply chain logistics costIAEME Publication
 
Comparison of strength properties of bitumen mixed with waste materials as mo
Comparison of strength properties of bitumen mixed with waste materials as moComparison of strength properties of bitumen mixed with waste materials as mo
Comparison of strength properties of bitumen mixed with waste materials as moIAEME Publication
 
Effects of surcharge loads on liquefaction parameters of pond ash improved w
Effects of surcharge loads on liquefaction parameters of pond ash improved wEffects of surcharge loads on liquefaction parameters of pond ash improved w
Effects of surcharge loads on liquefaction parameters of pond ash improved wIAEME Publication
 
Complex dynamics of superior phoenix set
Complex dynamics of superior phoenix setComplex dynamics of superior phoenix set
Complex dynamics of superior phoenix setIAEME Publication
 
Kekre’s hybrid wavelet transform technique with dct, walsh, hartley and kekre’s
Kekre’s hybrid wavelet transform technique with dct, walsh, hartley and kekre’sKekre’s hybrid wavelet transform technique with dct, walsh, hartley and kekre’s
Kekre’s hybrid wavelet transform technique with dct, walsh, hartley and kekre’sIAEME Publication
 
Optimization of supply chain logistics cost
Optimization of supply chain logistics costOptimization of supply chain logistics cost
Optimization of supply chain logistics costIAEME Publication
 
Weight reduction of pressure vessel using frp composite material
Weight reduction of pressure vessel using frp composite materialWeight reduction of pressure vessel using frp composite material
Weight reduction of pressure vessel using frp composite materialIAEME Publication
 
Manifiesto sobre la_literatura_infantil
Manifiesto sobre la_literatura_infantilManifiesto sobre la_literatura_infantil
Manifiesto sobre la_literatura_infantilvivi8913
 
Issues in the 21th century sifa arifhodzic - 07061765 - the future of work
Issues in the 21th century   sifa arifhodzic - 07061765 - the future of workIssues in the 21th century   sifa arifhodzic - 07061765 - the future of work
Issues in the 21th century sifa arifhodzic - 07061765 - the future of work07061765
 
Oscar d monrreal geometria i u3_t2_aa2
Oscar d monrreal geometria i u3_t2_aa2Oscar d monrreal geometria i u3_t2_aa2
Oscar d monrreal geometria i u3_t2_aa2leppoarts
 
Jane melisa arzuzar ardila gracias
Jane melisa arzuzar ardila graciasJane melisa arzuzar ardila gracias
Jane melisa arzuzar ardila graciasmeloardilla
 
METACOM - Um Método para Análise de Correlação entre Métricas de Produto de S...
METACOM - Um Método para Análise de Correlação entre Métricas de Produto de S...METACOM - Um Método para Análise de Correlação entre Métricas de Produto de S...
METACOM - Um Método para Análise de Correlação entre Métricas de Produto de S...Roberto Pepato
 
Letramento bibliotecas universitárias
Letramento bibliotecas universitáriasLetramento bibliotecas universitárias
Letramento bibliotecas universitáriasLeonardo Renault
 

Destacado (20)

Decentralized stabilization of a class of large scale linear interconnected
Decentralized stabilization of a class of large scale linear interconnectedDecentralized stabilization of a class of large scale linear interconnected
Decentralized stabilization of a class of large scale linear interconnected
 
Experience on using total station surveying for mapping and contouring
Experience on using total station surveying for mapping and contouringExperience on using total station surveying for mapping and contouring
Experience on using total station surveying for mapping and contouring
 
Optimization of supply chain logistics cost
Optimization of supply chain logistics costOptimization of supply chain logistics cost
Optimization of supply chain logistics cost
 
Comparison of strength properties of bitumen mixed with waste materials as mo
Comparison of strength properties of bitumen mixed with waste materials as moComparison of strength properties of bitumen mixed with waste materials as mo
Comparison of strength properties of bitumen mixed with waste materials as mo
 
Effects of surcharge loads on liquefaction parameters of pond ash improved w
Effects of surcharge loads on liquefaction parameters of pond ash improved wEffects of surcharge loads on liquefaction parameters of pond ash improved w
Effects of surcharge loads on liquefaction parameters of pond ash improved w
 
Complex dynamics of superior phoenix set
Complex dynamics of superior phoenix setComplex dynamics of superior phoenix set
Complex dynamics of superior phoenix set
 
Kekre’s hybrid wavelet transform technique with dct, walsh, hartley and kekre’s
Kekre’s hybrid wavelet transform technique with dct, walsh, hartley and kekre’sKekre’s hybrid wavelet transform technique with dct, walsh, hartley and kekre’s
Kekre’s hybrid wavelet transform technique with dct, walsh, hartley and kekre’s
 
Optimization of supply chain logistics cost
Optimization of supply chain logistics costOptimization of supply chain logistics cost
Optimization of supply chain logistics cost
 
Weight reduction of pressure vessel using frp composite material
Weight reduction of pressure vessel using frp composite materialWeight reduction of pressure vessel using frp composite material
Weight reduction of pressure vessel using frp composite material
 
Manifiesto sobre la_literatura_infantil
Manifiesto sobre la_literatura_infantilManifiesto sobre la_literatura_infantil
Manifiesto sobre la_literatura_infantil
 
Issues in the 21th century sifa arifhodzic - 07061765 - the future of work
Issues in the 21th century   sifa arifhodzic - 07061765 - the future of workIssues in the 21th century   sifa arifhodzic - 07061765 - the future of work
Issues in the 21th century sifa arifhodzic - 07061765 - the future of work
 
Oscar d monrreal geometria i u3_t2_aa2
Oscar d monrreal geometria i u3_t2_aa2Oscar d monrreal geometria i u3_t2_aa2
Oscar d monrreal geometria i u3_t2_aa2
 
Jane melisa arzuzar ardila gracias
Jane melisa arzuzar ardila graciasJane melisa arzuzar ardila gracias
Jane melisa arzuzar ardila gracias
 
Guadalinfo actividad 1
Guadalinfo actividad 1Guadalinfo actividad 1
Guadalinfo actividad 1
 
METACOM - Um Método para Análise de Correlação entre Métricas de Produto de S...
METACOM - Um Método para Análise de Correlação entre Métricas de Produto de S...METACOM - Um Método para Análise de Correlação entre Métricas de Produto de S...
METACOM - Um Método para Análise de Correlação entre Métricas de Produto de S...
 
Curriculum oculto
Curriculum ocultoCurriculum oculto
Curriculum oculto
 
Yasuní
YasuníYasuní
Yasuní
 
El agua
El aguaEl agua
El agua
 
01 reales
01 reales01 reales
01 reales
 
Letramento bibliotecas universitárias
Letramento bibliotecas universitáriasLetramento bibliotecas universitárias
Letramento bibliotecas universitárias
 

Similar a Developing and comparing an encoding system using vector quantization &

Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hidingMinimum image disortion of reversible data hiding
Minimum image disortion of reversible data hidingIRJET Journal
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationIJERA Editor
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationIJERA Editor
 
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...IJERA Editor
 
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting SchemeIRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting SchemeIRJET Journal
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...eSAT Publishing House
 
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...ijcsit
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey ijsc
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )ijsc
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...prjpublications
 
Influence of local segmentation in the context of digital image processing
Influence of local segmentation in the context of digital image processingInfluence of local segmentation in the context of digital image processing
Influence of local segmentation in the context of digital image processingiaemedu
 
An efficient hash based steganography technique for text message using col
An efficient hash based steganography technique for text message using colAn efficient hash based steganography technique for text message using col
An efficient hash based steganography technique for text message using colIAEME Publication
 
Compression of Compound Images Using Wavelet Transform
Compression of Compound Images Using Wavelet TransformCompression of Compound Images Using Wavelet Transform
Compression of Compound Images Using Wavelet TransformDR.P.S.JAGADEESH KUMAR
 
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...IAEME Publication
 
Image compression by ezw combining huffman and arithmetic encoder
Image compression by ezw combining huffman and arithmetic encoderImage compression by ezw combining huffman and arithmetic encoder
Image compression by ezw combining huffman and arithmetic encoderIAEME Publication
 
Image compression techniques by using wavelet transform
Image compression techniques by using wavelet transformImage compression techniques by using wavelet transform
Image compression techniques by using wavelet transformAlexander Decker
 

Similar a Developing and comparing an encoding system using vector quantization & (20)

dwm
dwmdwm
dwm
 
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hidingMinimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
 
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
Quality Compression for Medical Big Data X-Ray Image using Biorthogonal 5.5 W...
 
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting SchemeIRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...
 
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
 
A0540106
A0540106A0540106
A0540106
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
 
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
 
Influence of local segmentation in the context of digital image processing
Influence of local segmentation in the context of digital image processingInfluence of local segmentation in the context of digital image processing
Influence of local segmentation in the context of digital image processing
 
An efficient hash based steganography technique for text message using col
An efficient hash based steganography technique for text message using colAn efficient hash based steganography technique for text message using col
An efficient hash based steganography technique for text message using col
 
Compression of Compound Images Using Wavelet Transform
Compression of Compound Images Using Wavelet TransformCompression of Compound Images Using Wavelet Transform
Compression of Compound Images Using Wavelet Transform
 
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
 
Image compression by ezw combining huffman and arithmetic encoder
Image compression by ezw combining huffman and arithmetic encoderImage compression by ezw combining huffman and arithmetic encoder
Image compression by ezw combining huffman and arithmetic encoder
 
Image compression techniques by using wavelet transform
Image compression techniques by using wavelet transformImage compression techniques by using wavelet transform
Image compression techniques by using wavelet transform
 
50120130406010
5012013040601050120130406010
50120130406010
 

Más de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Más de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfAnna Loughnan Colquhoun
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 

Último (20)

The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 

Developing and comparing an encoding system using vector quantization &

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 503 DEVELOPING AND COMPARING AN ENCODING SYSTEM USING VECTOR QUANTIZATION & EDGE DETECTION Ms. SONALI MEGHARE & Prof. ROSHANI TALMALE Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engineering, RTMNU, Nagpur ABSTRACT Developing and comparing an encoding system using VQ and edge detection gives a real-time image coding. The edge detection gives the result that the compression is perfect on the basis of finding the edges of the compressed video. The comparison gives the better result than the existing Haar transform with respect to time. The compression ratio is get increased using downsample method as compared to Haar transform. Downsample method also gives the better edge detection than Haar transform. The encoding process applied is independent of the vector dimensions and does not perform any arithmetic operations. The decision tree generated by an offline process. Together with pipeline architecture, high speed encoding is now realizable in a single Chip. A new systolic architecture to realize the encoder of full- search vector quantization (VQ) for high-speed applications. INTRODUCTION Recently a new interest has been arisen in the field of the very low bit rate video application. The motivation of this new interest lies in the development of new applications such as videophones, video conferencing, and many others. The major requirements for these applications are the low capacity for transmission and storage, in order to use the existing Public Switched Telephone Networks (PSTN) or mobile channels numerous algorithms have been explored to implement the high compression system, such as model based and object- based methods. The advent of multimedia has evidenced a merger of computer technology and television technology. This merger has resulted in the emergence of several applications such as teleconferencing, videophone and video-on-demand. These applications would not be possible without an efficient video compression algorithm. Several international standardization activities are aiming at developing high performance video compression INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 3, May-June (2013), pp. 503-511 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 504 techniques for different applications, e.g. H.261 for video conferencing, MPEGI for CD- ROM based applications, MPEG2 for broadcast TV etc. Currently the MPEG standardization group has started an investigative effort towards developing a standard (currently referred to as MPEG4) for low bit rate video compression. VQ has been considered as an efficient block- based lossy compression technique. Edge detection provides information on an object’s edge transitions instead of a full picture of the object. RELATED WORK Work done in the area of edge detection and vector quantization is reviewed and focus has been made on detecting the edges of the digital images. Edge detection is a problem of fundamental importance in image analysis. In typical images, edges characterize object boundaries and are therefore useful for segmentation, registration, and identification of objects in a scene. Edge detection of an image reduces significantly the amount of data and filters out information that may be regarded as less relevant, preserving the important structural properties of an image. OVERVIEW OF VECTOR QUANTIZATION Quantization is used to reduced the total number of bits needed for a compressed image. Scalar Quantization: Maps one sample of input signal to one quantized output. Vector Quantization: Set of input Data to single codeword. Vector quantization is a classical quantization technique from signal processing which allows the modeling of probability density functions by the distribution of prototype vectors. It was originally used for data compression. It works by dividing a large set of points (vectors) into groups having approximately the same number of points closest to them. Each group is represented by its centroid point; The density matching property of vector quantization is powerful, especially for identifying the density of large and high-dimensioned data. Since data points are represented by the index of their closest centroid, commonly occurring data have low error, and rare data high error. This is why VQ is suitable for lossy data compression. It can also be used for lossy data correction and density estimation. Vector quantization, also called "block quantization" or "pattern matching quantization" is often used in lossy data compression. It works by encoding values from a multidimensional vector space into a finite set of values from a discrete subspace of lower dimension. A lower-space vector requires less storage space, so the data is compressed. Due to the density matching property of vector quantization, the compressed data have errors that are inversely proportional to their density Overview of Edge Detection Edge detection refers to the process of identifying and locating sharp discontinuities in an image. The discontinuities are abrupt changes in pixel intensity which characterize boundaries of objects in a scene.Edge detecting an image significantly reduces the amount of data and filters out useless information, while preserving the important structural properties in an image.
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 505 Canny Edge Detector Edges characterize boundaries and are therefore a problem of fundamental importance in image processing. list of criteria to improve current methods of edge detection. The first and most obvious is low error rate. It is important that edges occurring in images should not be missed and that there be NO responses to non-edges. The second criterion is that the edge points be well localized. In other words, the distance between the edge pixels as found by the detector and the actual edge is to be at a minimum. A third criterion is to have only one response to a single edge. This was implemented because the first 2 were not substantial enough to completely eliminate the possibility of multiple responses to an edge. Low Bit Rate Picture Coding Very low bit rate image coding is an important problem regarding applications such as storage on low memory devices or streaming data on the internet. The state of the art in image compression is to use 2D wavelets. The advantages of wavelet base multiscale nature and in their ability to separtly present functions that are Piecewise smooth.Their main problem on the other hand, is that in 2D wavelets are not able to deal with the natural geometry of images, i.e they cannot separately represent objects that are smooth away from regular sub manifolds ability to present functions that are piecewise smooth. Their main problem on the other hand, is that in 2D wavelets are not able to deal with the natural geometry of images, i.e they cannot sparsely represent objects that are smooth away from regular sub manifolds Object Extraction Enables structured object based coding at different bit streams , and Vector Quantizer is to encode blocks by simple numbering. The block-based coding has been conventionally employed by a number of picture coding algorithms such as MPEG1/2, H.263, etc. However, usually the edges of an object in a picture spread over numbers of blocks. This is the reason why the block-based coding causes the so-called block distortion in coded images which considerably degrades the picture quality. To overcome this drawback of the block-based coding, the object-based coding is adopted so that at the subsequent stage the objects in a picture can be classified into a number of groups according to their motions and sizes. Motion Compensator A motion compensator is a device that decreases the undesirable effects of the relative motion between two connected objects. Motion compensators are usually placed between a floating object and a more stationary object, such as a vessel or a structure fixed to the seabed. The motion compensator does not prevent the motion, but tries to eliminate the negative effects of the movement. Geometric Vector Quantization Geometric Vector Quantization (GVQ), is one type of product vector quantization methods, in this method the code vectors are inspired by edge related features of the high- frequency sub bands. The code vectors for a two-level GVQ that we used are composed of binary-valued blocks reflecting the basic shapes found in the upper sub bands and two locally adapted intensity values, which indicate minimum and maximum intensities for each coded block.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 506 System Flow for Image Basic step for Simulation of a Image Initially generate Do image file in MATLAB Run Do file in MATLAB Enter the name of entity in MATLAB Select the path for input image in MATLAB in temporary folder Create new project in modelsim Run VHDL file After compiling the VHDL code generate Text file Run Text file then generate matrix Put the matrix in MATLAB command window Run the matrix to get the output result Result of Vector Quantization using image Fig 1. Input Image After giving input image in matlab. Import this do file in modelsim for applying VQ and generate the text file for this input video. Fig 2. Text matrix for image After creating the text file copy the text matrix in command window of matlab and run the file. Fig 3. Output Result of compress image
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 507 Result Of Edge Detection Fig 4. Original image Fig 5. Result of edge detection by Canny Operator on Image System Flow for Video Initially generate Do Video file in MATLAB Run Do video file in MATLAB Enter the name of entity in MATLAB Enter number of frames to be extracted Select the path for input Video in MATLAB in temporary folder Create new project in modelsim Run VHDL file After compiling the VHDL code generate Text file Run Text file then generate matrix Put the matrix in MATLAB command window Run the matrix to get the output result Result of Vector Quantization and Edge detection using Video Fig 6. Input video
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 508 Initially create Do file in Matlab. For creating the do file firstly enter the name of entity that must be match with the entity name of the modelsim. Eg. the entity name in modelsim is E_LowBitRateEncoding. This entity name is gives in single quotation. Eg. ‘E_LowBitRateEncoding’. Fig 7. Input frames in modelsim After giving the do file in modelsim the input frames is done in binary format. Fig 8. Matrix for input video After copying the text file in matlab window then run the video player for view the output compressed video Fig 9. Output Compressed video
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 509 Fig 10. Edge detection of compressed video Result of compressed video using Haar Transform Comparisons between Haar and Downsample method with respect to time and compression ratio Video Time Compression Ratio Downsample aamir 2 us 94.67% Haar aamir 1.58 s 75% Downsample Flower 6 us 99.67% Haar Flower 10.75 s 75% Downsample Car 15 us 94.67% Haar Car 12.81 s 75% Downsample Man 12 us 94.67% Haar Man 12.81 s 75% Downsample Traffic 9 us 78.67% Haar Traffic 8.38 s 75% Haar aamir 1.58 s 75% From the table and the output of the videos it has been cleared that the compression quality of the downsample method is much good compared with the Haar transform and the compression ratio also get increased. The edge detection part is also done very accurately in the downsample method.
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 510 CONCLUSION This paper contain Vector Quantization used for lossy data compression, lossy data correction, and coding parts. it also measure image compression ratio with specified extracting number of frame which have been selected by input image with image size by generating text matrix in VHDL run at MATLAB command window. This paper also describes an edge detection technique which recognize the edges of an image to show that compression is perfect. REFERENCES [l] “A very low bit rate video coding system using adaptive region classified vector quantization”, National Taiwan University, by Yee-Wen Chen and Mei-Juan chen. [2] ”Low bit-rate video streaming for face to face teleconference”, by Zhen Wen and Tomas Huang. [3] F. Bartolini, V. Cappellini, A. Mecocci, and R. Vagheggi: “A segmentation-based motion compensated scheme for low-bit video coding”. [4] Journal of Information Hiding and Multimedia Signal Processing © 2010 ISSN 2073- 4212, by Zhe-Ming Ln [5] Chanyul kim and Noel E. O’Connor “Low complexity video compression using moving edge detection based on DCT coefficients” [6] International Journal of Recent trends in engineering, vol, 1, No. 2, May 2009 on “edge detection techniques for image segmentation of soft computing approaches”. [7] University of Strathclyde, U.K., by the GEC Marconi Hirst Research centre by Stathis P.Voukelatos and John J. Soraghan on “very low bit rate color video coding using vector quantization”. [8] International Journal of Image Processing by Raman maini and Dr.Himanshu Aggarwal on “Study and coparision of various Image edge detection techniques” [9] N.S. Jayant, P. Noll, Digital Coding of Waveform,Principle and Application to Speech and Video ,Prentice-Hall [10] G. Karlsson and M. Vetterli, “Subband Coding ofVideo Signals for Packet Switched Networks,”Proceeding of SPIE Conf. on visual communicationand image processing 11, Vol. 845, Cambridge, MA [11] Z. Li and Z. M. Lu, Fast code vector search scheme for 3D mesh model vector quantization,IETElectronics Letters, vol. 44, no. 2, pp. 104–105, 2008 [12] Z. M. Lu and Z. Li, Dynamically restricted codebook based vector quantization scheme for mesh geometry compression” Signal, Proc. of Image and Video Processing, vol. 2, no. 3 pp. 251–260, 2008. [13] Z. M. Lu and H. Pei, Hybrid Image Compression Scheme Based on PVQ and DCTVQ,IEICE Trans.Information and Systems, vol. E88-D, no. 10, pp. 2422–2426, 2005. [14] Raman Maini and J. S. Sobel, "Performance Evaluation of Prewitt Edge Detector for Noisy Images", GVIP Journal, Vol. 6, Issue 3, December 2006 [15] Li Dong Zhang; Du Yan Bi; "An improved morphological gradient edge detection algorithm”, Communications and Information Technology, ISCIT 2005. IEEEInternational Symposium on Volume 2, (s):1280 – 1283, 12-14 Oct. 2005.
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 511 [16] B. Yang, Z. M. Lu, D. G. Xu, and S. H. Sun, Neighboring pixels based low complexity predictive vector quantization algorithms for image coding, ACTA ELECTRONICA SINICA, vol. 31, no. 5, pp. 707–710, 2003 [17] Rital, S.; Bretto, A.; Cherifi, H.; Aboutajdine, D.; combinatorial edge detection algorithm on noise images", Video/Image Processing and Multimedia Communications 4thEURASIPIEEE Region 8 International Symposium on VIPromCom, (s):351 – 355, 16-19 June 2005. [18] Gonzalez, R and Woods, R., "Digital Image Processing" 2/E, Prentice Hall Publisher, 2002 [19] Zhao Yu-qian; Gui Wei-hua; ChenZhen-cheng; Tang Jing-tian; Li Ling-yun; "Medical Images Edge Detection Based on Mathematical Morphology" Engineering in Medicine and Biology Society, IEEE-EMBS. 27th Annual International Conference, (s):6492 – 6495, 01- 04 Sept. 2004. [20] S. A. Rizvi and N. M. Nasrabadi, Predictive residual vector quantization, IEEE Trans. Image Processing, vol. 4, no. 11, pp. 1482–1495, 2003. [21] P. Gerken,” Object-Based Analysis-Synthesis Coding of Image Sequences at Very Low Bit Rates,” IEEE Trans. on Circuits and Systems for Video Tech.pp. 228-235 ,June 2001. [22] C. S. Choi and K.Aizawa,” Analysis and Synthesis of Facial Image Sequences in Model-Based Image Coding,” IEEE Trans. on Circuits and Systems for Video Tech. pp. 257-275 ,June 2001. [23] Y. Linde, A. Buzo and R.M. Gray, ” An algorithm for vector quantizer design,”IEEE Trans.Commun,Vol. COM-28, pp. 84-95, January 2001 [24] J. Canny, A computational approach to edge detection. IEEE Transactions on Pattern Analysis and Machine Intelligence PAMI-8 6 2000, [25] S.Anandanarayanan and Dr.S.K.Srivatsa, “A High Performance Novel Image Compression Technique using Huffman Coding with Edge Dection”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 17 - 22, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [26] R. Pushpavalli and G.Sivaradje, “Nonlinear Filtering Technique for Preserving Edges and Fine Details of Digital Images”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 1, 2012, pp. 29 - 40, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.