基于置换和预测的有损彩色图像压缩(IJIGSP-V9-N6-4)
- 格式:pdf
- 大小:1.38 MB
- 文档页数:8
基于姿态参数切换的四元数快速传递对准算法周卫东;吉宇人;乔相伟【摘要】In order to solve the problem of large misalignment angle in rapid transfer alignment, a quaternion unscented filter algorithm making the use of transformation of attitude parameters is investigated based on building nonlinear quaternion error model. Firstly, the transform relation between quaternion and modified Rodriguez parameters was utilized to derive the quaternion formula of weighted sum, which made the calculation more directly. Then the normalization problem of quaternion part in disturb sigma points was solved by the method which obtained the vector part by calculating the sigma points firstly, and got the scalar part according to the normalizing condition afterwards; meanwhile, the error variance matrix containing the attitude quaternion was derived and corresponding formulas were presented on this basis. The simulation experiment shows that the estimation accuracy and rapidity of this algorithm for large misalignment angle can be satisfied for transfer alignment.%针对快速传递对准过程中的大失准角情况,在建立非线性四元数误差模型的基础上,对利用姿态参数转换的四元数无迹卡尔曼滤波(QUKF)进行研究.通过四元数和修正罗德里格斯参数间的相互转换关系对四元数加权求和公式进行推导,使计算更为直观.针对扰动sigma点中四元数部分的规范性问题,通过先计算sigma 点得到其向量部分,再利用单位化约束得到标量部分的方法进行解决,并在此基础上对含有姿态四元数的误差方差阵进行推导并给出相应公式.仿真结果表明,该算法对大失准角的估计准确度和快速性可以满足传递对准的要求.【期刊名称】《电机与控制学报》【年(卷),期】2012(016)012【总页数】6页(P72-77)【关键词】快速传递对准;修正罗德里格斯参数;四元数;无迹卡尔曼滤波;规范性【作者】周卫东;吉宇人;乔相伟【作者单位】哈尔滨工程大学自动化学院,黑龙江哈尔滨150001;哈尔滨工程大学自动化学院,黑龙江哈尔滨150001;哈尔滨工程大学自动化学院,黑龙江哈尔滨150001【正文语种】中文【中图分类】U666.10 引言Kain J E提出的速度+姿态匹配算法是目前最为常用的传递对准算法之一[1],其推导的快速传递对准模型在小角条件下进行了合理的线性化处理。
万方数据 万方数据2008年第9期全巍等:基于Imagi舱流处理器的JPEG图片压缩技术93}is眦am为输入数据流,os讹锄为输出数据流。
数据从fdct流出后直接进入quant进行量化处理,从quaJlt流出的数据在流程序中进行分块图片的重组,然后进行编码处理即可得到压缩的图片数据,再将数据写到图片文件中即可。
程序流程图如图3所示。
图3JPEC程序流程图4测试结果我们在设计该核心程序时,将每一帧数据放在一个cluster内进行处理,这样减少了数据通信,因为在图像处理中帧之间的相关性十分弱。
也就是说每一次计算就处理了八帧的数据,明显地提高了运算速率。
在我们设计的kemel中,一次把所有的图片信息都加载到一个数据流中,kemel内部来控制循环,这样减少了数据在sRF(流寄存器文件)与LRF(本地寄存器文件,即cluster内的寄存器文件)之间来回流动的次数,减少了数据准备的时间,但是这样做的代价是把kemel变大,没有生产者消费者之间的关系,也不利于优化。
kemel可进行的优化有软流水和循环展开,通过优化后的kemel其效率又会有一定的提高,图4、图5、图6分别是kemel优化前、软流水优化、循环展开后的指令调度示意图。
从图4、图5和图6可以看到通过优化后,指令的占空比提高了,尤其是循环展开效果更佳。
由于图片规格的大小只会重复执行更多次kemel指令,在此只列出图片规格为32・32的图片的统计结果就足以反映问题。
kemel在未经过优化时其执行时间为4245cycles,经过软流水优化后其执行时间没有明显的降低,但经过循环展开四次后效果最好,其执行时图4kemel优化前指令调度图图5kemel软流水优化后指令调度图图6k∞lel循环展开后指令调度图间为3811cycks,性能提高了lO%左右。
分析其原因是因为kemel程序本身是由多层循环组成,而循环内 万方数据 万方数据基于Imagine流处理器的JPEG图片压缩技术作者:全巍, 苏华友, 刘福东, QUAN Wei, SU Hua-you, LIU Fu-dong作者单位:国防科学技术大学计算机学院,湖南,长沙,410073刊名:计算机与现代化英文刊名:COMPUTER AND MODERNIZATION年,卷(期):2008(9)参考文献(8条)1.Kapasi U J Programmable stream processors[外文期刊] 2003(08)2.Rixner S A bandwidth-efficient architecture for media processing 19983.文梅Imagine流体系结构研究与评测 2004(zk)4.Arezou Koohi A fast parallel Reed-Solomon decoder on a reconfigurable architecture 20035.王湘新;文梅;伍楠媒体处理器体系结构研究 20046.陈辉JPEG压缩原理 20067.Dally W J Imagine Project 20028.文梅;伍楠;李礼有效解决带宽瓶颈的流式存储层次研究 2004本文链接:/Periodical_jsjyxdh200809026.aspx。
适于星上应用的高光谱图像无损压缩算法李进;金龙旭;李国宁【期刊名称】《光谱学与光谱分析》【年(卷),期】2012(32)8【摘要】针对常见基于预测、变换、矢量量化及其组合的高光谱无损压缩算法压缩比低、压缩算法整体耗时以及硬件实现困难的问题,提出一种适于星上应用的高光谱图像无损压缩算法.首先,沿光谱线的第一谱段图像采用中值预测器进行谱段内预测,其他谱段图像采用谱间预测.谱间预测采用两步双向预测算法,第一步预测采用双向二阶预测器得到参考预测值,第二步预测采用本文提出的改进LUT搜索预测算法得出4个LUT预测值,然后将参考预测值与其比较得出最终的预测值.最后,使用XX-X空间高光谱相机的压缩系统试验设备对该文提出的压缩算法进行了试验验证.结果表明,压缩系统能快速稳定地工作,平均压缩比达到3.05 bpp,与传统方法相比,平均压缩比提高了0.14~2.94 bpp.有效的提高了高光谱图像无损压缩比和解决了压缩算法整体实现困难的问题.%In order to resolve the difficulty in hardware implementation, lower compression ratio and time consuming for the whole hyperspectral image lossless compression algorithm based on the prediction, transform, vector quantization and their combination, a hyperspectral image lossless compression algorithm for space-borne application was proposed in the present paper. Firstly, intra-band prediction is used only for the first image along the spectral line using a median predictor. And inter-band prediction is applied to other band images. A two-step and bidirectional prediction algorithm is proposed forthe inter-band pre-dictioa In the first step prediction, a bidirectional and second order predictor proposed is used to obtain a prediction reference value. And a improved LUT prediction algorithm proposed is used to obtain four values of LUT predictioa Then the final prediction is obtained through comparison between them and the prediction reference. Finally, the verification experiments for the compression algorithm proposed using compression system test equipment of XX-X space hyperspectral camera were carried out. The experiment results showed that compression system can be fast and stable work. The average compression ratio reachedrn3.05 bpp. Compared with traditional approaches, the proposed method could improve the average compression ratio by 0. 14 ~ 2. 94 bpp. They effectively improve the lossless compression ratio and solve the difficulty of hardware implementation of the whole wavelet-based compression scheme.【总页数】6页(P2264-2269)【作者】李进;金龙旭;李国宁【作者单位】中国科学院长春光学精密机械与物理研究所,吉林长春130033;中国科学院研究生院,北京 100049;中国科学院长春光学精密机械与物理研究所,吉林长春130033;中国科学院长春光学精密机械与物理研究所,吉林长春130033【正文语种】中文【中图分类】O433.4【相关文献】1.基于多波段谱间预测的高光谱图像无损压缩算法 [J], 孙蕾;罗建书2.基于整数小波和三维自适应的高光谱图像无损压缩算法 [J], 向露;况军;韦文超3.高光谱图像无损压缩算法的DSP优化实现 [J], 何岳;王素玉;沈兰荪4.基于单邻点多波段预测的高光谱图像无损压缩算法 [J], 苏令华;万建伟5.基于3DLMS预测的高光谱图像无损压缩算法 [J], 陈永红;史泽林;李德强因版权原因,仅展示原文概要,查看原文内容请购买。
遥感干涉超光谱图像压缩编码
周有喜;肖江;吴成柯;李云松;相里斌;张金
【期刊名称】《光子学报》
【年(卷),期】2005(34)4
【摘要】基于卫星干涉超光谱成像光谱仪成像原理的分析,提出了一种新的遥感超光谱图像压缩方案,利用成像推扫平移特性提出一种低存储量,帧间小波域匹配的序列压缩,只需存储两帧图像,比起单帧处理提高图像PSNR3 4dB 为了保护图像的光谱特征,系统采用了一种新的感兴趣区域(Regionofinterest, ROI)编码技术,使系统的压缩比提高8倍以上该感兴趣区域(ROI)编码采用率失真优化斜率提升,而不是比特平面移位,使图像在相同的光谱分辨率下拥有更好的空间分辨率试验数据表明,算法大大保护了图像的光谱特性,在8倍压缩比情况时。
【总页数】4页(P594-597)
【关键词】图像压缩;干涉光谱图像;成像光谱技术;感兴趣区域编码
【作者】周有喜;肖江;吴成柯;李云松;相里斌;张金
【作者单位】西安电子科技大学综合业务网国家重点实验室;中国科学院西安光学精密机械研究所
【正文语种】中文
【中图分类】TN919.81
【相关文献】
1.基于分布式信源编码和感兴趣区域编码的干涉多光谱图像压缩 [J], 孔繁锵;吴宪云
2.多光谱遥感图像压缩系统中的ROI编码方法 [J], 肖江;吴成柯;邓家先;李云松
3.卫星遥感干涉多光谱图像压缩新算法 [J], 雷杰;周有喜;庄怀宇;吴成柯;李云松
4.基于运动估计和ROI编码的干涉多光谱图像压缩 [J], 雷杰;李云松;周有喜;吴成柯
5.干涉多光谱图像压缩编码新技术 [J], 马静;吴成柯;李云松;周有喜;相里斌;陈东因版权原因,仅展示原文概要,查看原文内容请购买。
基于色彩相关模板的彩色人头图像压缩编码方法
陈宇拓;韩旭里;余英林
【期刊名称】《计算机应用研究》
【年(卷),期】2005(022)010
【摘要】提出一种专门针对彩色人头图像压缩编码的新方法.该方法利用彩色人头图像在各个特征区域三个色彩分量之间的色彩相关性,建立其中一个色彩分量与另两个色彩分量之间的相关模板,并只需对第一个色彩分量进行量化编码,解码时重构这个色彩分量后,加上极少量的相关模板系数就可解出另两个色彩分量,从而恢复图像.实验结果表明,该方法不仅可以大大提高编码效率和压缩比,并且能获得较满意的重构图像效果.
【总页数】4页(P153-156)
【作者】陈宇拓;韩旭里;余英林
【作者单位】中南大学,计算机科学与技术系,湖南,长沙,410083;中南大学,计算机科学与技术系,湖南,长沙,410083;华南理工大学,电子与通信工程系,广东,广州,510641【正文语种】中文
【中图分类】TP391
【相关文献】
1.利用色彩分量相关性的彩色图像分形编码方法 [J], 曹文伦;彭国华;秦洪元;张军
2.基于RGB色彩模型相关模板的彩色人头图像编码 [J], 陈宇拓;李建红;杨炫;韩旭里;余英林
3.彩色图像压缩的量化编码方法研究 [J], 杨树媛
4.彩色图像压缩的量化编码方法研究 [J], 杨树媛
5.一种高效的基于矢量量化的彩色视频图像压缩编码方法 [J], 李庆忠;赵永霞;王文锦
因版权原因,仅展示原文概要,查看原文内容请购买。
一种支持干涉多光谱图像ROI的压缩编码方法
肖江;邓家先;吴成柯;相里斌;黄鸣
【期刊名称】《光子学报》
【年(卷),期】2003(32)4
【摘要】提出了一种基于EBCOT (率失真优化截取内嵌码块编码 )算法的矩形ROI(感兴趣区域 )编码的干涉多光谱卫星遥感图像压缩方法该方法不需要对小波域的系数进行提升 ,而是在码流组织时通过对多光谱区域的误差跟踪提高恢复图像的质量误差的跟踪完全是自适应的 ,可以根据用户给定的恢复图像多光谱区域的峰值信噪比最低要求自动实现码流的组织 ,解码器不需要知道该图像是否存在ROI ,而且该方法保留了EBCOT的优良特性实验结果表明。
【总页数】4页(P481-484)
【关键词】干涉多光谱图像;EBCOT;ROI;航天遥感;图像压缩;率失真优化截取内嵌码块编码算法;图像编码
【作者】肖江;邓家先;吴成柯;相里斌;黄鸣
【作者单位】西安电子科技大学综合业务网国家重点实验室;中国科学院西安光学精密机械研究所
【正文语种】中文
【中图分类】V443.5;TN919.81
【相关文献】
1.基于帧间预测和联合优化的干涉多光谱图像压缩感知重建算法 [J], 孔繁锵;井庆丰;计振兴
2.多光谱遥感图像压缩系统中的ROI编码方法 [J], 肖江;吴成柯;邓家先;李云松
3.基于运动估计和ROI编码的干涉多光谱图像压缩 [J], 雷杰;李云松;周有喜;吴成柯
4.一种新的高效干涉多光谱图像压缩算法 [J], 雷杰;周有喜;吴成柯;李云松;孔繁锵
5.一种干涉高光谱图像的3DSPIHT结合ROI压缩算法 [J], 马冬梅;马彩文;王阿妮因版权原因,仅展示原文概要,查看原文内容请购买。
I.J. Image, Graphics and Signal Processing, 2017, 6, 29-36Published Online June 2017 in MECS (/)DOI: 10.5815/ijigsp.2017.06.04Secured Lossy Color Image Compression Using Permutation and PredictionsS.ShunmuganResearch ScholarDept. of Computer Science and Engineering, Manonmaniam Sundaranar University, Tirunelveli,Email: shunsthc@P.Arockia Jansi RaniAssociate Professor,Dept. of Computer Science and Engineering, Manonmaniam Sundaranar University, Tirunelveli.Abstract—Due to rapid growth in image sizes, an alternate of numerically lossless coding named visually lossless coding is considered to reduce storage size and lower data transmission. In this paper, a lossy compression method on encrypted color image is introduced with undetectable quality loss and high compression ratio. The proposed method includes the Xinpeng Zhang lossy compression [1], Hierarchical Oriented Prediction (HOP)[2], Uniform Quantization, Negative Sign Removal, Concatenation of 7-bit data and Huffman Compression. The encrypted image is divided into rigid and elastic parts. The Xinpeng Zhang elastic compression is applied on elastic part and HOP is applied on rigid part. This method is applied on different test cases and the results were evaluated. The experimental evidences suggest that, the proposed method has better coding performance than the existing encrypted image compressions, with 9.645 % reductions in bit rate and the eye perception is visually lossless.Index Terms—HOP, Huffman Compression, Encryption, Permutation, Rigid data, Elastic data.I.I NTRODUCTIONAn immense amount of data is required in the field of image processing. The general problem of image compression is, to reduce the amount of data required to represent a digital image and the basis of the reduction process is the removal of spatial and psychovisual redundancies [3]. The compression can be either lossy or lossless. In lossless compression the reconstructed image is identical to the original image but in lossy compression method, it is not.In the present scenario especially in the corporate world, through the internet, the images travel rapidly and widely, in multiple manifestations. Confidential data in image form needs to be distributed through various sectors without any leakages. Compression alone will not be sufficient as anyone can access the image; hence encryption is required to allow only authorized persons to access. Controlling and protecting sensitive or confidential images are the process of Image security [4]. Preprocessing the image and transforming it into some intermediate form can be compressed with better efficiency to avoid natural redundancy. Government, military and private business organizations are having huge amount of confidential images [5]. Most of this information are stored in the computers and transmitted through internet to the other connected computers. When the confidential image is accessed by an unauthorized person will lead to lot of problems.To transmit secret images to people connected thought internet number of encryption schemes are available. Those schemes are classified into the following three types namely Position Permutation, Value Transformation and Visual Transformation [6]. Encryption plays a vital role in securing the images from the attacks while at rest as well as in transit[7]. Image Compression and Encryption Schemes are classified into two types, Compression-then-encryption and encryption-then-compression. There are very less chance to access the image and the image size is more in the later method. Former has chance to access the image with reduced size.This paper discusses categorization (rigid and elastic part separation) and evaluation of simultaneous image encryption with compression.The rest of this paper is organized as follows: Section II discusses about the related work. Section III discusses about the proposed methodology. Section IV describes about the analysis of the research work based on the performance evaluation factors. Finally in Section V conclusion is discussed.II.R ELATED W ORKS.S. Maniccam and N.G. Bourbakis [8] have presented SCAN methodology which performed both lossless compression and encryption of 512×512 gray-scale images.Masanori Ito et al. [9] proposed a method by combining encryption and compression based on Independent Component Analysis (ICA) and Discrete Cosine Transform (DCT). The target images are shieldedwith an insignificant image and their combinations to be transmitted are obtained by way of encryption. The original images are reconstructed by applying some Independent Component Analysis (ICA) algorithm to the combined images. The DCT and simple low pass filter are used in the compression. The quality of the reconstructed image is reduced, because the higher frequency components were cut off.V.Radha and D.Maheswari [10] proposed an image encryption algorithm that consists of two parts: scrambling of plain-image and mixing operation of scrambled image using discrete states variables of chaotic maps. The Discrete Cosine transform is used for compression. It reconstructs the image with high security and great speed but its compression ratio is less.Wei Liu et al. [11] used stream cipher based Slepian-Wolf coding for encryption with progressive lossless reconstruction.Shreedhar B.M et al. [12] used high level security with arithmetic coding based compression. Encryption is achieved by prediction error clustering and random permutation.D.Ranjani 1, G. Selvavinayagam [13] proposed a highly efficient image Encryption-Then-Compression system. Discrete Wavelet Transform is used for encryption and 2D Haar Wavelet Transform is used for compression.Shih-Ching Ou et al [14] proposed a new compression method with encryption system for internet multimedia applications. Significance-Linked Connected Component Analysis (SLCCA) method is used for compression and AES is used for encryption.B.C.Prudhvi Teja and M.Venkatesh Naik [15] proposed a new system that uses random permutation based encryption with Haar and Daubechies Wavelet Transform based compression.III.M ETHODOLOGYThis paper proposes a new color image compression scheme for encrypted images. The compression process is shown in Fig. 1.Initially the input image is encrypted using the pseudo random permutation process. Then the encrypted image is divided into rigid data and elastic data [1]. The rigid data is compressed in the visually lossless manner and the elastic data is subject to lossy compression.For visually lossless compression the rigid data is divided into two parts namely L & H using the Hierarchical Oriented Prediction (HOP) [10]. Predicted-H is then calculated with the use of L. The Error-H is calculated by the difference between predicted-H and original-H using the Equation 1.Error_H = Original_H – Predicted_H (1)Again L is divided into LH & LL. Then, Predicted-LH is calculated with the use of LL and the Error-LH is also calculated using the Equation 2.Error_LH = Original_LH – Predicted_LH (2) Then the Error-LH and Error-H information are quantized using the Equation 3.EQ i,j=fix(E i,jq c) (3) Where E i,j is Error pixel data at i,j th locationEQ i,j is Quantized error data at i,j th locationq c is Quantization Constant = 2Before the quantization process, the information is distributed in the range 0 to 255. The error information occupies one byte (8 bit) data storage. After the quantization process the error information is distributed in the range 0 to 127. This quantized information occupies 7 bit data storage for each rigid pixel.The sign information of the error data is extracted. The negative sign is indicated by 1 and the positive sign is indicated by 0. The LSB of the error information is modified by either 0 or 1 in order to embed the sign information. So there is no need of carrying the sign information using extra bits. It is known as negative sign removal process. This is performed using Equations 4 and 5.EE i,j=fix(EQ i,j2)∗2+Func_Sign(EQ i,j) (4) Func_Sign(EQ i,j)={1 if EQ i,j<00 otℎerwise} (5)Where EE i,j is 7 bit error pixel data after the sign is removed at i, j th locationFunc_Sign(EQ i,j) is sign extraction functionThese 7 bit rigid data are converted into 8 bit sequence i.e. 7 bit data are placed continuously in the linear form. Then the continuous 8 bits are grouped as a single byte data and these data are used to form the integrated linear error information.Finally, LL and the integrated linear error information is combined to form a new rigid data. The Huffman compression is applied on the new rigid data.The elastic data is compressed using Xinpeng Zhang [1] method to reduce 8 bit elastic information into 2 bit information. The compressed elastic data and the Huffman output are concatenated to construct the final compressed data.In the decompression section the compressed rigid data and the compressed elastic data are separated. Inverse Huffman is applied on rigid data to get the original-LL and the error information.Fig.1. Proposed compression SchemeThe 8 bit error sequence is converted into 7 bit data sequence. The negative sign information is extracted from the LSB of the 7 bit data sequence using the Equation 6.EQ i,j={−1∗ EE i,j,if mod(EE i,j,2)=1EE i,j otℎerwise} (6)Where EQ i,j is 7 bit error pixel data after sign restoration at i, j th location.The extracted sign information is used to restore the 7 bit data sequence. The error information is subject to the inverse quantization process using Equation 7.IQ i,j=EQ i,j∗q c (7) Where IQ i,j is Error pixel data at i,j th locationThe predicted-LH is constructed using the original-LL using the HOP prediction. The reconstructed-LH is obtained by adding the predicted-LH and error-LH using Equation 8.Reconstructed_LH = Predicted_LH + Error_LH (8)The original-LL and the reconstructed-LH are used to generate the reconstructed-L using Equation 9.Reconstructed_L = FI(Original_LL,Reconstructed_LH) (9)Where FI is a function for the integrationThe HOP prediction is applied to generate the predicted-H using reconstructed-L. The predicted-H and the error-H are used to form the reconstructed-H using Equation 10.Reconstructed_H = Predicted_H + Error_H (10)The reconstructed-L and the reconstructed-H are continued to reconstruct the final rigid data using the integration process given in Equation 11.RigidData = FI( Reconstructed_LReconstructed_H) (11)The RigidData is the final decompressed rigid data. Then the Xinpeng Zhang [1] method is used to decompress the elastic data with the help of rigid data. The elastic data decompression process involves a joint decompression with encryption to reconstruct the output image.IV.E XPERIMENTAL R ESULTSVarious experiments are conducted to analyze the performance of existing methods such as encrypted JPEG-LS, encrypted HUFFMAN and Ximpeng Zhang method against the proposed method.JPEG-LS [16] is one of the lossless coding of still images. The main objective of JPEG-LS is to yield a low complexity solution for lossless image coding with the better possible compression efficiency. In the implementation, the input image is encrypted and it is compressed using JPEG-LS method. It is referred as the Encrypted JPEG method (EJPEG).The Huffman coding is a variable-length coding algorithm which is used for lossless compression. It is a method for the construction of minimum-redundancy codes. A source symbol is encoded in a particular way based on the estimated probability of occurrence for each possible value of the source symbol. In the implementation phase, the Huffman coding is applied after the image encryption. It is referred as Encrypted HUFFMAN method (EHUFFMAN).The Xinpeng Zhang [1] method delivers a scheme for encrypted image compression in lossy manner. This methodology includes the components of joined image encryption with compression and joined decompression with decryption. In the decompression section an iterative approach is proceeded.A good system provides maximum secrecy with maximum fidelity using the least number of bits/symbol[17]. The Time Consumption performance of the proposed system is tabulated in Table 1. From Table1, it can be inferred that the proposed work gives compression ratio around 1.5 for color images. The Fig 2 shows the experimenal compression ratio with variousmethods.a bc de fg hi jFig.2. Compression stage : a. Original color image b. Red channel color image c. Encrypted Red channel d. HOP Red channel e. Green channel color image f. Encrypted Green channel g. . HOP Green channel h. Blue channel color image i.Encrypted Blue channel j. HOP Blue channela bc de fg hi jFig.3. Deompression stage : a. HOP Red channel b. Decrypted Red channel c. Enhanced Red channel d. HOP Green channel e. Decrypted Green channel f. Enhanced Green channel g. . HOP Green channel h. Decrypted Blue channel i. Enhanced Bluechannel j. Reconstructed ImageTable 1. Performance analysis with CR for PSNR 34.60 dbFig.4. Compression Ratio performance analysis.In Table1, the compression ratio of the proposed system is compared with the existing EJPEG, EHUFFMAN and Xinpeng Zhang methods and the results are plotted in Fig.4. From Table1 and Fig.4, it can be inferred that the proposed method gives better gain in compression ratio. These four CR values are computed against the constant Peak Signal to Noise Ratio (PSNR) value 34.60db. The term CR means Compression Ratio and it is calculated using Equation 12.CR = BSOI BS RI(12)WhereOI is original imageRI is reconstructed image BS is byte sizeTable 2. Performance analysis with compression and decompressiontime consumptionFig.5. Time consumption performance analysis.In Table2 and Fig.5, the time consumption performance of the proposed system is compared with the existing EJPEG, EHUFFMAN and Xinpeng Zhang methods and the results are shown. The time taken for both compression and decompression are little high in the proposed system but it provides better compression ratio and image quality. So, these time taken variations are reasonable and are acceptable. In this table the term CTT represents Compression Time Taken whereas DTT represents Decompression Time Taken.In Table3 and Fig.6, the Mean Square Error (MSE) and PSNR performance measures are taken into account to make the performance analysis. From this table and figure it is proved that the proposed method reaches the lowest MSE and the highest PSNR compared with existing methods. The lowest MSE and the highest PSNR gives higher visual quality. The MSE is calculated using Equation 13 and the PSNR is calculated using Equation 14.0.20.40.60.811.21.41.6E J P E GE H UF F M A NX i n p e n g Z h a n gP r o p o s e dE J P E GE H UF F M A NX i n p e n g Z h a n gP r o p o s e dFruit.bmp Lena.bmpC O M P R E S S I O N R A T I OCOMPRESSION METHODSPerformance Analysis withCR123456789E J P E GE H UF F M A NX i n p e n g Z h a n gP r o p o s e dE J P E GE H UF F M A NX i n p e n g Z h a n gP r o p o s e dfruit.bmp Lena.bmpT I M E C O N S U M P T I O N (I N S E C O N D S )COMPRESSION METHODSPerformance Analysis withtime consumptionCTTDTTTable 3. Performance analysis with MSE and PSNR for CR value 1.21MSE =1MN∑∑(OI i,j −RI i,j )2N j=1M i=1 (13)PSNR = 10 log 10( 2552/ MSE ) (14)WhereOI is original imageRI is reconstructed image M is image height N is image widthFig.6. MSE and PSNR performance analysis Table 4. Performance analysis with BPP for CR value 1.21 In Table 4, the Bits Per Pixel (BPP) of the proposed system is compared with the existing EJPEG, EHUFFMAN and Xinpeng Zhang methods and the results are plotted in Fig.7. From Table 4 and Fig.7, it can be inferred that the proposed method gives better gain in BPP. These four BPP values are computed against the constant Compression Ratio (CR) value 1.21. The BPP is calculated using Equation 15.BPP = 8 / CR (15)Where CR is Compression RationFig.7. BPP performance analysisTable 5. Performance analysis with BR for CR value 1.21In Table 5, the Bit Rate (BR) of the proposed system is compared with the existing EJPEG, EHUFFMAN and Xinpeng Zhang methods and the results are plotted in Fig.8. From Table 5 and Fig.8, it can be inferred that the proposed method gives better gain in BR. These four BR values are computed against the constant Compression Ratio (CR) value 1.21. The BPP is calculated using Equation 16.BR = RI / (M x N x 3) (16)20406080100120140160E J P E GE H UF F M A NX i n p e n g Z h a n gP r o p o s e dE J P E GE H UF F M A NX i n p e n g Z h a n gP r o p o s e dFruit.bmp Lena.bmpM S E A N D P S N R V A L U E SCOMPRESSION METHODSPerformance Analysis with MSE and PSNR for CR 1.21MSEPSNR012345678E J P E GE H UF F M A NX I N P E N G Z H A N GP R O P O S E DE J P E GE H UF F M A NX I N P E N G Z H A N GP R O P O S E DFRUIT.BMP LENA.BMPP e r c e n t a g eCompression MethodsPerformance analysis ofBits Per PixelWhereRI is Reconstructed Image M is image height N is image widthFig.8. BR performance analysisTable 6. Performance analysis with PSSS for CR value is 1.21 In Table 6, the Percentage of Storage Space Saving (PSSS) of the proposed system is compared with the existing EJPEG, EHUFFMAN and Xinpeng Zhang methods and the results are plotted in Fig.9. From Table 6 and Fig.9, it can be inferred that the proposed method gives better gain in PSSS. These four PSSS values are computed against the constant Compression Ratio (CR) value 1.21. The BPP is calculated using Equation 17.PSSS = 1 – (1 / CR) * 100 (17)Where CR is Compression RatioFig.9. Percentage of Storage Space Saving performance analysisV. C ONCLUSIONThe proposed method aims to compress the encrypted color images. Permutation based encryption is used in this paper. This joint encryption with compression method includes prediction based rigid data encoding, seven bit storage and negative sign removal processes. This paper improves the compression ratio by 9.645%. This method is suitable for image security applications. By considering the overall performance metrics, this paper concludes that the proposed method is better than the existing methods. In future enhancement the seven bit compressed storage can be improved to (n-k) bit compressed storage.R EFERENCE[1] Lossy Compression and Iterative Reconstruction forencrypted images, Xinpeng Zhang, IEEE transactions on Information forensics and security, vol. 6, no. 1, March 2011.[2] Hierarchical Oriented Predictions for Resolution ScalableLossless and Near-Lossless Compression of CT and MRI Biomedical Images, Jonathan Taquet and Claude Labit, IEEE transactions on Image processing, vol. 21, no. 5, May 2012.[3] Image Compression and Encryption: An Overview, AbdulRazzaque, PG Scholar and Dr. Nileshsingh V. Thakur, Associate Professor, Department of Computer Science and Engg, RCOEM, Nagpur, India, International Journal0.010.020.030.040.050.060.070.08E J P E GE H UF F M A NX I N P E N G Z H A N GP R O P O S E DE J P E GE H UF F M A NX I N P E N G Z H A N GP R O P O S E DFRUIT.BMP LENA.BMPP e r c e n t a t e Compression MethodsPerformance analysis ofBit Rateof Engineering Research & Technology (IJERT) Vol. 1 Issue 5, July - 2012 ISSN: 2278-0181.[4]An in intelligent text data encryption and compression for high speed and secure data transmission over internet, Dr. V.K. Govindan, B.S. Shajee mohan, Prof. & Head CSED, NIT Calicut, Kerala ,Assistant Prof.,CSED, L.B.S.C.E., Kasaragod, Kerala.[5]Maninder Kaur, “A review paper on a secure image encryption-then compression system using wavelet via prediction error clustering and random permutation”, International journal of engineering sciences & research technology, vol. 4, pp. 570-574, Apr 2015.[6]Shuqun Zhang and Mohammed A. Karim, “Color image encryption using double random phase encoding ”Microwave and optical technology letters” Vol. 21, No. 5, June 5 1999, 318-322.[7] Theory & Practice James Kelley and Roberto Tamassia Dept. of Computer Science, Brown University March 12, 2014[8] S. S. Maniccam, and N. G. Bourbakis ―SCAN Based Lossless Image Compression and Encryption‖ IEEE 0-7695-0446-9/99, pp. 490-499, 1999[9]Masanori Ito, Noboru Ohnishi, Ayman Alfalou and Ali Man sour, ―New Image Encryption And Compression Method Based On Independent Component Analysis‖, IEEE , 2007[10] V.Radha, D.Maheswari, ―Secured Compound Image Compression Using Encryption Techniques‖, 978-1-4244-5967-4/ IEEE 2010[11]Wei Liu, Wenjun Zeng, Lina Dong and Qiuming Yao, ―Resolution -progressive Compression of Encrypted Grayscale Images‖, University of Missouri, Columbia MO 65211, USA, 2007.[12]Shreedhar BM, Vishal IL, Hemavathi N “Image Encryption-Then-Compression System via Prediction Error Clustering and los sless encoding” International Journal of Innovative Research in Information Security (IJIRIS), vol 4, pp. 33-39, Apr 2015.[13]D.Ranjani and G.Selvavinayagem “Improving Efficiency in Image Encryption Then Compression System”, International Journal for Research in Applied Science & Engineering Technology (IJRASET), vol 3, pp. 359-363, Mar 2015.[14]Shih-Ching Ou · Hung-Yuan Chung · Wen-Tsai Sung “Improving the compression and encryption of images using FPGA-based cryptosystems ”, S pringer, Multimed Tools, vol 5, pp 22-27, Apr 2006.[15] B.C.Prudhvi Teja, M.Venkatesh Naik, “ A New ApproachOf Image Compression - Encryption System Based On Optimal Value Transfer”, International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE), vol, 16, pp. 43-45, July 2015.[16] Diego Santa cruz, and TouradjEbrahimi “An Analyticalstudy of JPEG 2000 Functio nalities” IEEE transactions on Image processing, vol.2, pp.49-52,Sep 2000.[17] On compressing encrypted Data, Mark Johnson andDaniel Schonberg, IEEE transactions on signal processing, vol. 52, No.10, October 2004.Authors’ ProfilesS. Shunmugan received the M.C.A degree from Manonmaniam Sundaranar University, Tirunelveli in 1999, M.Phil (Computer Science) degree from Manonmaniam Sundaranar University, Tirunelveli in 2004 and M.E (Computer Science & Engineering) degree from Manonmaniam Sundaranar University, Tirunelveli in 2013. He isworking as Assistant Professor of Computer Science, at S.T.HinduCollege, Nagercoil since 2001. His current research interest include signal or image processing, medical imaging, and biometric imaging.Dr. P. Arockia Jansi Rani , graduated B.E in Electronics and Communication Engineering from Government College of Engineering,Tirunelveli, Tamil Nadu, India in 1996 and M.E in Computer Science and Engineering from National Engineering College, Kovilpatti, Tamil Nadu, India in 2002. She has been with theDepartment of Computer Science and Engineering, Manonmaniam Sundaranar University as Assistant Professor since 2003. She has more than ten years of teaching and research experience. She completed her Ph.D in Computer Science and Engineering from Manonmaniam Sundaranar University, Tamil Nadu, India in 2012. Her research interests include Digital Image Processing, Neural Networks and Data Mining.How to cite this paper: S.Shunmugan, P.Arockia Jansi Rani,"Secured Lossy Color Image Compression Using Permutation and Predictions", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.9, No.6, pp.29-36, 2017.DOI: 10.5815/ijigsp.2017.06.04。