0 Up votes0 Down votes

5 views33 pagesDec 21, 2011

© Attribution Non-Commercial (BY-NC)

PPT, PDF, TXT or read online from Scribd

Attribution Non-Commercial (BY-NC)

5 views

Attribution Non-Commercial (BY-NC)

- The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine who Outwitted America's Enemies
- Steve Jobs
- NIV, Holy Bible, eBook
- NIV, Holy Bible, eBook, Red Letter Edition
- Hidden Figures Young Readers' Edition
- Cryptonomicon
- Make Your Mind Up: My Guide to Finding Your Own Style, Life, and Motavation!
- The Golden Notebook: A Novel
- Alibaba: The House That Jack Ma Built
- The 10X Rule: The Only Difference Between Success and Failure
- Autonomous: A Novel
- Hit Refresh: The Quest to Rediscover Microsoft's Soul and Imagine a Better Future for Everyone
- Hit Refresh: The Quest to Rediscover Microsoft's Soul and Imagine a Better Future for Everyone
- Life After Google: The Fall of Big Data and the Rise of the Blockchain Economy
- Algorithms to Live By: The Computer Science of Human Decisions
- Console Wars: Sega, Nintendo, and the Battle that Defined a Generation
- The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution

You are on page 1of 33

School of Computer Science, University of Central Florida, VLSI and M-5 Research Group

June 1, 2000

Organization

Basic concept Introduction of the algorithm An example 1-D RMF example 2-D RMF example Basic Idea Band_max construction algorithm An example Experimental results

Conclusions

E The EZW encoder is based on progressive encoding. Progressive encoding is also known as embedded encoding Z A data structure called zero-tree is used in EZW algorithm to encode the data W The EZW encoder is specially designed to use with wavelet transform. It was originally designed to operate on images (2-D signals)

Lower octave has higher resolution and contains higher frequency information

The EZW algorithm is based on two observations:

Natural images in general have a low pass spectrum. When an image is wavelet transformed, the energy in the sub-bands decreases with the scale goes lower (low scale means high resolution), so the wavelet coefficient will, on average, be smaller in the lower levels than in the higher levels. Large wavelet coefficients are more important than small wavelet coefficients.

86 10 -7 29 55 -54 -13 30 -12 44 41 32 37 17 -4 13 -13 39 32 -4 9 -23 -17 -35 56 -22 -7 -25 40 -10 -44 4 13 -12 21 24 -8 -24 -42 9 -21 45 -16 -15 31 -11 -10 -17

The observations give rise to the basic progressive coding idea:

1.

2.

3.

We can set a threshold T, if the wavelet coefficient is larger than T, then encode it as 1, otherwise we code it as 0. 1 will be reconstructed as T (or a number larger than T) and 0 will be reconstructed as 0. We then decrease T to a lower value, repeat 1 and 2. So we get finer and finer reconstructed data.

The actual implementation of EZA algorithm should consider : 1. What should we do to the sign of the coefficients. (positive or negative) ? answer: use POS and NEG 2. Can we code the 0s more efficiently? -- answer: zero-tree 3. How to decide the threshold T and how to reconstruct? answer: see the algorithm

The definition of the zero-tree: There are coefficients in different subbands that represent the same spatial location in the image and this spatial relation can be depicted by a quad tree except for the root node at top left corner representing the DC coeeficient which only has three children nodes. Zero-tree Hypothesis

If a wavelet coefficient c at a coarse scale is insignificant with respect to a given threshold T, i.e. |c|<T then all wavelet coefficients of the same orientation at finer scales are also likely to be insignificant with respect to T.

First step: The DWT of the entire 2-D image will be computed by FWT Second step: Progressively EZW encodes the coefficients by decreasing the threshold Third step: Arithmetic coding is used to entropy code the symbols

What is inside the second step?

threshold = initial_threshold; do { dominant_pass(image); subordinate_pass(image); threshold = threshold/2; } while (threshold > minimum_threshold);

The main loop ends when the threshold reaches a minimum value, which could be specified to control the encoding performance, a 0 minimum value gives the lossless reconstruction of the image The initial threshold t0 is decided as:

Here MAX() means the maximum coefficient value in the image and y(x,y) denotes the coefficient. With this threshold we enter the main coding loop

In the dominant_pass

All the coefficients are scanned in a special order If the coefficient is a zero tree root, it will be encoded as ZTR. All its descendants dont need to be encoded they will be reconstructed as zero at this threshold level If the coefficient itself is insignificant but one of its descendants is significant, it is encoded as IZ (isolated zero). If the coefficient is significant then it is encoded as POS (positive) or NEG (negative) depends on its sign.

This encoding of the zero tree produces significant compression because gray level images resulting from natural sources typically result in DWTs with many ZTR symbols. Each ZTR indicates that no more bits are needed for encoding the descendants of the corresponding coefficient

At the end of dominant_pass

all the coefficients that are in absolute value larger than the current threshold are extracted and placed without their sign on the subordinate list and their positions in the image are filled with zeroes. This will prevent them from being coded again. All the values in the subordinate list are refined. this gives rise to some juggling with uncertainty intervals and it outputs next most significant bit of all the coefficients in the subordinate list.

In the subordinate_pass

EZW An example(1)

EZW An example(2)

The initial threshold is 32 and the result from the dominant_pass is shown in the figure

63 POS -31 IZ 15 ZTR -9 ZTR --5 -34 NEG 23 ZTR 14 IZ -7 ZTR 9 49 POS 14 ZTR 3 10 ZTR -13 ZTR -12 7 IZ 3 IZ 5 13 IZ 4 IZ -7 -12 7

-1

-14

-2

-1 IZ -3 IZ 6

47 POS 2 IZ -4

-2

-2

-3

11

-4

EZW An example(3)

The result from the dominant_pass is output as the following:

POS, NEG, IZ, ZTR, POS, ZTR, ZTR, ZTR, ZTR, IZ, ZTR, ZTR, IZ, IZ, IZ, IZ, IZ, POS, IZ, IZ

POS01, NEG11, ZTR00, IZ--10

The significant coefficients are put in a subordinate list and are refined. A one-bit symbol is output to the decoder.

Original data Output symbol Reconstructed data 63 1 56 34 0 40 49 1 56 47 0 40

If T+.5T is less than data item take the average of 2T and 1.5T. So 63 will be reconstructed as the average of 48 and 64 which is 56. If it is more, put a 0 in the code and encode this as t+.5T+.25T. Thus, 34 is reconstructed as 40.

EZW An example(4)

*

-31 15 -9 --5 3 2 5

*

23 14 -7 9 0 -3 11

*

14 3 -14 -1 -3 6 5

10

-13 -12 8 * 2 -4 6

7

3 5 4 4 3 3 0

13

4 -7 -2 6 -2 6 3

-12

6 3 3 -2 0 3 -4

7

-1 9 2 2 4 6 4

After dominant_pass, the significant coefficients will be replaced by * or 0 Then the threshold is divided by 2, so we have 16 as current threshold

EZW An example(5)

The result from the second dominant_pass is output as the following:

IZ, ZTR, NEG, POS, IZ,IZ, IZ, IZ, IZ, IZ, IZ, IZ

The significant coefficients are put in the subordinate list and all data in this list will be refined as:

Original data Output symbol Reconstructed data 63 1 60 34 0 36 49 0 52 47 1 44 31 1 28 23 0 20

For example, the output for 63 is: sign 32 16 8 4 2 1 0 1 1 1 ? ? ? The computatin is now extended with respect to the next significant bit. So 63 will be reconstructed as the average of 56 and 64 - 60!

EZW An example(6)

The process is going on until threshold =1, the final output as:

D1: pnztpttttztttttttptt S1: 1010 D2: ztnptttttttt S2: 100110 D3: zzzzzppnppnttnnptpttnttttttttptttptttttttttptttttttttttt S3: 10011101111011011000 D4: zzzzzzztztznzzzzpttptpptpnptntttttptpnpppptttttptptttpnp S4: 11011111011001000001110110100010010101100 D5: zzzzztzzzzztpzzzttpttttnptppttptttnppnttttpnnpttpttppttt S5: 10111100110100010111110101101100100000000110110110011000111 D6: zzzttztttztttttnnttt Here p=pos, n=neg, z=iz, t=ztr

For example, the output for 63 is: sign 32 16 8 4 2 1 0 1 1 1 1 1 1 So 63 will be reconstructed as 32+16+8+4+2+1=63! Note, how progressive transmission can be done.

bad

It is not possible to encode sub-images because the entire image must be transformed before the encoding can start. EZW algorithm is computational expensive

Complete wavelet coefficients for (x1, x2)

input

x1 x2 x3 x4 x5 x6 x7 x8

filter

s1 d1 s2 d2 s3 d3 s4 d4

S1 D1 d1 d2 S2 D2 d3 d4

S1 D1 D1 D2 d1 d2 d3 d4

Wavelet coefficients

RMF

HH band is the concatenation of the four smaller HH bands HL band is the concatenation of the four smaller LH bands followed by the column-wise 1-D RMF LH band is the concatenation of the four smaller HL bands followed by the row-wise 1-D RMF LL band is the concatenation of the four smaller LL bands followed by the 2-D RMF

Input image

The sub-image level coding is possible because: we have the complete wavelet coefficients for each sub-image. For each of them, we apply the EZW algorithm.

In the original EZW algorithm, each time when we check one coefficient is a ZTR or not, we compare all its descendants with the threshold This is very time-consuming! However, if we know the maximum absolute value among these descendants, we only need to compare this maximum absolute value with the threshold. If the maximum absolute value is smaller than the threshold, we can claim that there is no descendant of the current coefficient has an absolute value that is larger than the threshold and the current node is a zero-tree root Obviously, the maximum value for each sub-band should be maintained, we call this maximum value band_max value.

There are two kinds of band_max value. The current_band_max value of each band is the maximum absolute value of wavelet coefficients for that band and its descendant sub-bands. The previous_band_max value is the value that is propagated to the next step of the RMF computation in order to efficiently generate the current_band_max values for the next step band_max construction. The band_max could be constructed as a by-product of the RMF computation

The construction of the band_max in HH band

=current_band_max_HH[octave];

Because in 2-D RMF computation, the new HH band is just the concatenation of the four smaller HH bands, the maximum in the new HH band is simply the maximum among the the four maximums in the smaller HH bands.

The construction of the band_max in HL band

In the new HL band, only the coefficients in the first two rows are new.

The coefficients in the first row will be replaced by new data so they shouldnt be considered.

The construction of the band_max in LH band

In the new LH band, only the coefficients in the first two columns are new.

The coefficients in the first column will be replaced by new data so they shouldnt be considered.

ZTR When we encode 23, instead of comparing all its descendants with T, we only need to compare current_band_max_HH[2] with T. We save 19 comparisons! Suppose we have a ZTR in the highest octave of a 512*512 image, In the original EZW algorithm, we need 87380 comparisons but now we need only ONE!

Current_band_max_HH[1]=6 Current_band_max_HH[2]=14

Image: Man Image Size EZW Coding Time (s) RMF-EZW Coding Time (s) Improvement Image: Lena Image Size EZW Coding Time (s) RMF-EZW Coding Time (s) Improvement Image: Peppers Image Size EZW Coding Time (s) RMF-EZW Coding Time (s) Improvement 32*32 0.09 0.08 11.11% 64*64 0.89 0.77 13.48% 128*128 9.01 7.06 21.64% 256*256 101.239998 64.150002 36.64% 512*512 1523.650024 802.140015 47.35%

Improvement of The Execution Time by RMF-EZW Algorithm

60.00%

Improvment In Percentage

50.00% 40.00% 30.00% 20.00% 10.00% 0.00% 0 200 400 600 Image Size Man Lena Peppers

RMF-EZW conclusions

The RMF algorithm makes the sub-image level EZW coding possible. The band_max information, which is generated as the by-product of RMF computation, could improve the speed of the EZW coding by 11% (for 32*32 image) to 50% (for 512*512 image) or even higher depends on the image size.

- Fourier Neural NetworksUploaded byياسينبوهراوة
- Chapter4.pdfUploaded byZahra Mir Bagheri
- BuildingSimulation2013Uploaded byMichael Georgescu
- InTech-The Wavelet Transform for Image Processing ApplicationsUploaded bylakshmigajendran
- A Comparative Study of Content Based Image Retrieval Trends and ApproachesUploaded byAI Coordinator - CSC Journals
- cnss_fw_logs_000.txtUploaded byGerardo Houtlas
- Paper 12-Wavelet Based Change Detection for Four Dimensional Assimilation Data in Space and Time DomainsUploaded byEditor IJACSA
- Revista_de_geodezie_cartografie_si_cadastru_volumul_16_numerele_1_2_2007.pdfUploaded byGheorghe Sava
- Shadow Detection Using DWT With Multi-Wavelet Selection & User Configurable Variance ParametersUploaded byEditor IJRITCC
- Wave Let ClassUploaded byMohammad Gulam Ahamad
- Wavelets and Subband CodingUploaded byHieu Luu
- Paper15_CozoriciUploaded byLe Thanh Hai
- IJAIEM-2013-07-30-124Uploaded byAnonymous vQrJlEN
- SPIJ_V6_I2Uploaded byAI Coordinator - CSC Journals
- Optimizing the Parameters of Wavelets for Pattern Matching Using Ga_norestrictionUploaded byIAEME Publication
- Pixel Based Fusion Methods for Concealed Weapon DetectionUploaded byAnonymous 7VPPkWS8O
- Iris Pattern Recognition Using Complex Wavelet And Wavelet Packet TransformUploaded byJournal of Computer Applications
- biwaveletUploaded byThiago Melquíades
- Acoustic_Measurements_of_Partial_Discharge_Signals.pdfUploaded byHeri Sutikno
- Ecg EstimationUploaded byJubin Jain
- Image Denoising Using Trivariate Shrinkage FilterUploaded byVijay Mohan
- 10.1016@j.eswa.2008.11.015.pdfUploaded byJosh Buenafe Macapallag
- Cable Fault Offliine DetermineUploaded bychau
- brunone2004.pdfUploaded byMarcelo Pessoa
- Space Vector Modulation for Vf Induction Motor Control_WulfeniaUploaded bykhalafgaeid
- GOPI.docxUploaded byVamsi Krishna
- Multiresolution Analysis in FMRIUploaded byAndrew
- Adewole MTech Thesis Adewole AC FINALUploaded byNaga Ananth
- 20110709Uploaded bysnehal
- MPX1 BK (Stereo DJ Mixer)Uploaded bylistentomerijn

- Forrest Mims III - Getting Started in Electronics (Radio Shack)Uploaded bysunilsingh5789
- 2mark and 16 MarkUploaded bysakilakumaresan
- sem4Uploaded bymahabalabhatt
- Childrens Nursery Rhymes (ENG)Uploaded byiniyaraj
- 20592814 Wireless Communications Principles and Practices Solutions Manual Theodore RappaportUploaded bySandeep Sachan
- Tamil Rhymes&SongsUploaded byGiri Sankar
- CE2027 Housing Planning and ManagementUploaded bysakilakumaresan
- EE6201-CT-U1-5-QBUploaded bysakilakumaresan
- EE6211-Electric Circuits Laboratory MANUALUploaded bysakilakumaresan
- 555 TIMERUploaded byRasuka Kishore
- MatUploaded bysakilakumaresan
- Electronics Lab Manual 1Uploaded bydivyajdiv

- wireless communication lesson plan.pdfUploaded byThahsin Thahir
- ADC TrendsUploaded byscribeFz
- Contoh snaraiUploaded byKanda Aduka
- 10 Windows HandoutsUploaded bysaisudhasreegarugu
- NAS SyllabusUploaded bydilpals
- Multiplex ErUploaded byDan Patrick Diña Solayao
- Microsoft Word - Tutorial for Ansoft Designer SV_English VersionUploaded byshonen_0408
- Agilent White Paper on Signal Generator Phase Noise 5990-7529ENUploaded byLisa Riley
- AMR(RAN16.0_01)Uploaded byhekri
- GUIDE TO WDM TECHNOLOGY_EXFO.pdfUploaded byhas
- Powermate 600Uploaded byDexVa
- AP7181_ProductReferenceGuideUploaded byAdvantec Srl
- Wcdma Soft Hard HoUploaded byacidwarrior
- AbstractionUploaded bypankaj
- Using Induction Motor Stator Windings to Extract Speed InformationUploaded bymareymorsy2822
- Digital Energy MeterUploaded byIkechukwu Igboebisi
- Alok ResumeUploaded byAlok Pandey
- DS ExploreAir LR Licensed a 0412 Web Sept2012Uploaded byNorwelle Altamarino Baluyan
- AN10007-Jitter-and-measurement.pdfUploaded byDenise Nelson
- EC – ELECTRONICS AND COMMUNICATION ENGINEERINGUploaded byBala Santosh
- KlmUploaded byPeter de Sa
- Fast Dormancy Best PracticesUploaded byfanc:
- soundcraft catalogue.pdfUploaded bymanny gaballo
- Detection and Jamming Low Probability of Intercept RadarUploaded byknightatarms
- 8212_4_ECE_R13_IV-IIUploaded byKarim Shaik
- Que Es Un Lock-In AmplifierUploaded bylljjbbee
- Lc Ladder Matching NetworksUploaded byCarriceiros Tour
- LTE相关名词缩写集锦Uploaded bygame___over
- EPMP Capacity Planner Guide R2.3Uploaded byJohn Book
- Prakash 74 Dsp FileUploaded byMihir Mehta

## Much more than documents.

Discover everything Scribd has to offer, including books and audiobooks from major publishers.

Cancel anytime.