The contour tree image encoding technique and file format

نویسنده

  • Martin John Turner
چکیده

The process of contourization is presented which converts a raster image into a discrete set of plateaux or contours . These contours can be grouped into a hierarchical structure, defining total spatial inclusion, called a contour tree. A contour coder has been developed which fully describes these contours in a compact and efficient manner and is the basis for an image compression method. Simplification of the contour tree has been undertaken by merging contour tree nodes thus lowering the contour tree's entropy. This can be exploited by the contour coder to increase the image compression ratio. By applying general and simple rules derived from physiological experiments on the human vision system, lossy image compression can be achieved which minimises noticeable artifacts in the simplified image. The contour merging technique offers a complementary lossy compression system to the QDCT (Quantised Discrete Cosine Transform) . The artifacts introduced by the two methods are very different; QDCT produces a general blurring and adds extra highlights in the form of overshoots, whereas contour merging sharpens edges, reduces highlights and introduces a degree of false contouring. A format based on the contourization technique which caters for most image types is defined, called the contour tree image format. Image operations directly on this compressed format have been studied which for certain manipulations can offer significant operational speed increases over using a standard raster image format. A couple of examples of operations specific to the contour tree format are presented showing some of the features of the new format .

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image Operations using a Semi-compressed Contour Tree Image Definition

The contour tree file format has been used for a few years as a suitable storage format for most image types. The technique stores unique regions into a hierarchical data structure which defines the complete raster image. This data structure is called a contour tree. It compares very favourable with other lossless coding schemes on all image format types including, bi-level and reduced colour i...

متن کامل

Video Watermarking using Fractal Encoding & RLE Encoding

Compression of the color images and videos has many applications in most of the mobile technologies. Reducing the time taken for file transfer is important in digital communication fields. Image compression means reducing the graphics file size, without degrading the quality of the image. For digital images, Fractal image Compression (FIC) and run length coding has been considered as an efficie...

متن کامل

Effect of Phase-Encoding Reduction on Geometric Distortion and BOLD Signal Changes in fMRI

Introduction Echo-planar imaging (EPI) is a group of fast data acquisition methods commonly used in fMRI studies. It acquires multiple image lines in k-space after a single excitation, which leads to a very short scan time. A well-known problem with EPI is that it is more sensitive to distortions due to the used encoding scheme. Source of distortion is inhomogeneity in the static B0 field that ...

متن کامل

Improving security of double random phase encoding with chaos theory using fractal images

This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...

متن کامل

Proposed Idea for Steganography Assignment

The idea behind this technique is to utilize the presence of punctuation marks like , ; : “ etc. in the text for encoding a secret message. The secret message to be communicated will be hidden in any piece of text through binary encoding of punctuation marks. Two punctuation marks can be used to represent binary data or several punctuation marks can be used to represent binary combinations. The...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994