Document Type : Research Paper

Author

Al-Anbar university-Computer & Information Technology Center.

10.37652/juaps.2011.44309

Abstract

The mathematical concept of a DCT transform is a powerful tool in many areas; it is also, served as an
approach in image processing discipline. In this work an image is processed as three color channel. The correlated
pixels values of an image can be transformed to a representation where its coefficients are de-correlated. The term "decorrelated"
means that the transformed values are independent of one another. As a result, they can be encoded
independently, which make it simpler to construct a statistical model. Correlated values are coded with run-length
coding techniques while shift coding used to decode the DC term and the other five lifting values. In this work, we
suggest to save the first five values from every block to keep it back without any significant errors.The obtained bit
rates was extended to be within range (11.4 , 2.6), compression ratio (2.76 , 13.34 )the values of the fiedility
parameters (PSNR) was within the range (31.61 , 46.21) for the lena test image in both sizes (128×128 and 256×256),
and PSNR was calculated as average for the three color channels, red, green , blue

Keywords

Main Subjects

[1] Unbough S. E., “Computer Vision and Image Processing: A      practical Approach Using CVIPtools”, by Prentice Hall PTR, 1998.
[2] David Bethel, "optimisation of still image compression technigues", PhD, "university of Bath",1997.
[3] Cacciaguerra, S & Ferret, S ; “Applied digital Signal processing EECE UBC JPEG Image Compression”, University of Bologna..
[4] Numerical Recipes Inc, "Art of Scientific computing", by Cambridge University Press, 1988, 1992. http://www.nr.com, directcustcustserv@combridge.org
[5] Abdulla M. Awad,"DCWT – hybrid image compression method", master thesis,Sub. To college of Science, university of anbar, 2004.
[6] Sarin George Mathec, "Wavelet Transform based adaptive image compression on FPGA" University of Calicnt, India, 1996.
[7] Bender, W. and Gruhl; "Techniques for data hiding", IBM System Journal, vol. 35, no.s 3 & 4, pp. 314, 1996.
[8] Latha Pilliai,"Quantization", XILINX, June, 2003.
[9] D. Huffman,"Amethod for the construction of minimum Redundancy cades", Proceedding of the IRE, Vol 40, PP1098,110, 2002.