CHAPTER 6 A SECURE FAST 2D-DISCRETE...

21
115 CHAPTER 6 A SECURE FAST 2D-DISCRETE FRACTIONAL FOURIER TRANSFORM BASED MEDICAL IMAGE COMPRESSION USING SPIHT ALGORITHM WITH HUFFMAN ENCODER 6.1. INTRODUCTION Various transforms like DCT, DFT used to achieve image transformation have been described by Ramesh Babu Durai et al (2012). Contourlet based ROI method with wavelet transform is a better method of digital signals and images. By means of expensive calculation, processing of data compression has eased the burden of image transmission and storage as discussed by Tamilarasi & Palanisamy (2009). Data compression attempts to decrease the size of the image by concentrating on the removal of superfluous data. Storage area of the image can be doubled by compressing an image into half its original size as stated by Al-Sammraie & Khamis (2008). Thus, the spatial and spectral redundancies which minimize the number of bits needed to represent an image is eliminated. This facilitates substantial reduction in the bandwidth requirement for transmitting an image over the network. Data storage, archiving and communication of medical images over the internet to the end user have significant applications for data compression as stated by Ghrare et al (2008). In this chapter, a DICOM images are encrypted using Quasigroup Encryption with Hadamard and Number Theoretic Transformation. For a

Transcript of CHAPTER 6 A SECURE FAST 2D-DISCRETE...

Page 1: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

115

CHAPTER 6

A SECURE FAST 2D-DISCRETE FRACTIONAL FOURIER

TRANSFORM BASED MEDICAL IMAGE COMPRESSION

USING SPIHT ALGORITHM WITH HUFFMAN ENCODER

6.1. INTRODUCTION

Various transforms like DCT, DFT used to achieve image

transformation have been described by Ramesh Babu Durai et al (2012).

Contourlet based ROI method with wavelet transform is a better method of

digital signals and images. By means of expensive calculation, processing of

data compression has eased the burden of image transmission and storage as

discussed by Tamilarasi & Palanisamy (2009). Data compression attempts to

decrease the size of the image by concentrating on the removal of superfluous

data. Storage area of the image can be doubled by compressing an image into

half its original size as stated by Al-Sammraie & Khamis (2008). Thus, the

spatial and spectral redundancies which minimize the number of bits needed

to represent an image is eliminated. This facilitates substantial reduction in

the bandwidth requirement for transmitting an image over the network. Data

storage, archiving and communication of medical images over the internet to

the end user have significant applications for data compression as stated by

Ghrare et al (2008).

In this chapter, a DICOM images are encrypted using Quasigroup

Encryption with Hadamard and Number Theoretic Transformation. For a

Page 2: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

116

secure compression Fast Two Dimensional Discrete Fractional Fourier

Transform (DFRCT) and a SPIHT Algorithm with Huffman Encoder is used.

6.2. COMPRESSION USING FAST 2D-DISCRETE

FRACTIONAL FOURIER TRANSFORM AND SPIHT

ALGORITHM WITH HUFFMAN ENCODER

This approach comprises of the following phases namely,

Encryption, Domain Transformation, SPIHT algorithm with Huffman

Compression; Decoding through SPIHT with Huffman Encoder and Inverse

Fast Two Dimensional Fractional Fourier Transform and finally Quasi group

decryption with Hadamard and Number Theoretic Transform.

Figure 6.1 Overall Flow of the Proposed SPIHT Algorithm with Huffman Coding Image Compression Approach

6.2.1. Quasigroup Encryption with Hadamard and Number Theoretic

Transformation

The usage of transforms would effectively diffuse statistics where

the security is improved through a variety of them and by transforming them

(Reddy 2012). The employment of chained Hadamard transforms and

Original DICOM Image

Quasi Group Encryption with Hadamard and Number Theoretic

Transformation

Fast Two-Dimension

Discrete Fractional Fourier

Transform

SPIHT Algorithm with Huffman

Encoder

Decoding with SPIHT Algorithm

with Huffman Encoder

Fast Two-Dimension

Discrete Inverse Fractional Fourier

Transform

Quasi Group Decryption with inverse Hadamard and Number Theoretic

Transformation

Decompressed DICOM Image

Page 3: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

117

Number Theoretic Transforms (NTT) are investigated in this approach to

introduce diffusion together with the Quasigroup transformation.

Number Theoretic Transforms are also a certain kind of discrete

Fourier transforms. It is based on generalizing the nth primitive root of unity

to a quotient ring rather than using complex numbers. Figure 6.2 represents

the general architecture of the proposed encryption and hash system scheme.

In this approach, the input image will be subjected to different

transformations sequentially like Quasigroup transformation, Hadamard

transformation and Number theoretic transformation. For Hadamard and

Number theoretic transforms, the input data is divided into a definite group of

bits in such a manner that each group bit count is the order of the equivalent

matrix.

Figure 6.2 General Architecture of the Proposed Encryption System

A. Hadamard Transforms

The Hadamard Transform is a generalized class of Discrete Fourier

transforms (Ulman 1970; Ce & Bing 2009). It is created either recursively, or

through binary representation. All the values in the matrix are non-negative.

Each negative number is replaced with equivalent modulo number. For

instance, in modulo 7 Hadamard matrixes -1 is replaced with 6 to make the

matrix non-binary. Owing to its symmetric form, it can be used in

Encryption System Input data Output data

Spreading Code

Order of matrices

Page 4: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

118

applications such as data encryption and randomness measures Goldburg et al

(1993). Only prime modulo operations are carried out since non-prime

numbers can be divisible with numbers other than 1 and itself. Recursively, 1

× 1 Hadamard transform is defined by the identity = 1, and then

for m > 0 by,

= (6.1)

A Hadamard matrix, , is a square matrix of order n = 1, 2 or 4k

where k represents a positive integer. The elements of H are either +1 or –1

and . = , where is the transpose of , and is the identity

matrix of order n. A Hadamard matrix is said to be normalized if all of the

elements of the first row and first column are +1. Some examples of the

Hadamard matrices are given below,

= + 1 (6.2)

= 1 11 (6.3)

Hadamard matrix of modulo 31 of size 8*8

1 1 1 1 1 1 1 1

1 30 1 30 1 30 1 30

1 1 30 30 1 1 30 30

1 30 30 1 1 30 30 1

1 1 1 1 30 30 30 30

1 30 1 30 30 1 30 1

1 1 30 30 30 30 1 1

1 30 30 1 30 1 1 30

Page 5: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

119

Hadamard matrix of modulo 7 of size 4*4

1 1 1 1

1 6 1 6

1 1 6 6

1 6 6 1

The concept of encryption is to multiply the decimated input

sequence with the non-binary Hadamard matrix in a chained manner block by

block. The block size is based upon the size of the selected Hadamard matrix.

Input sequence is taken in the form of column matrix. Figure 3 shows the

block diagram of Hadamard Encryption.

Figure 6.3 Hadamard Encryption

B. Number Theoretic Transforms

Number Theoretic Transform depends on generalizing the nth

primitive root of unity to a quotient ring rather than through complex numbers

(Kak 1971).

1 1 1 1111

(6.4)

Block 1 Hadamard Transform Block 2 Hadamard

Transform

Block n Hadamard Transform

Page 6: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

120

The unit w is exp (2 / n). Number Theoretic Transform is now all

about = 1

NTT matrix of order 6*6

1 1 1 1 1 1

1 3 2 6 4 5

1 2 4 1 2 4

1 6 1 6 1 6

1 4 2 1 4 2

1 5 4 6 2 3

i. NTT Encryption

Figure 6.4 Number Theoretic Encryption

Figure 6.4 shows the block diagram for the Number Theoretic

Encryption. The notion of encryption is to multiply the decimated input

sequence which is the output attained after encryption by means of Hadamard

transform with the non-binary Number theoretical matrix in a chained manner

block by block. The block size is based upon the size of the selected Number

theoretical matrix. The Input sequence is taken in the form of column matrix.

Block 1 NTT

Transform Block 2 NTTTransform

Block n NTTTransform

Page 7: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

121

C. Encryption

Phase1: Encryption of input data using Quasigroup based

encryption system.

Phase2: Output of Phase1 is given as input to the Phase 2. In

phase2 Hadamard transformation of data is carried out.

Phase3: Output of Phase2 is given as input to the Phase 3. In

phase 3 Number Theoretic Transform is performed.

Phase4: Phase2 is repeated with a different order of Hadamard

matrix.

These four phases are clearly depicted in Figure 6.5.

Figure 6.5 Proposed Quasigroup Encryption System

Phase 1 Phase 2 Phase 3

Phase 4

Quasigroup Encryptor (q*q)

Hadamard Transform (m1*m1)

Number Theoretical

Transform (n*n)

Hadamard Transform (m2*m2)

Input integer stream

Encrypted output

Page 8: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

122

6.2.2. Fast Two-Dimension Discrete Fractional Fourier Transform

A. Development Of 1D DFRFT Algorithm

In Shih’s definition of FRFT, the FRFT is subjective to the

weighted composition of the j th order Fourier transforms (j =0, 1, 2, 3) of the

original function.

Generally the FRFT is written as,

[ ( )] = exp 34

) cos2

× cos4

( ) (6.5)

In the same way, it can be incidental that DFRFT is also subjective

to the weighted composition of the first four orders of Discrete Fourier

Transform (DFT). Thus, the th order of DFRFT can be implemented by the

equation below.

[ ( )] = exp 34

) cos2

× cos4

( ) (6.6)

where ( )( = 0, 1, 2, 3) is the m th order of DFT of the original sequence

f (n) . DFT is defined here as follows,

[ ( )] =1

( ) (6.7)

where N is length of the sequence.

Page 9: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

123

So ( )( = 0, 1, 2, 3) in (6.7) can be obtained by the Fast

Fourier Transform (FFT) algorithm. After obtaining the mth (m=0, 1, 2, 3)

order of DFT of f (n) , the DFRFT of f (n) can then be calculated as a linear

combination. Obviously, such an algorithm shares the same level of accuracy

and efficiency with FFT, which means a sample of N points, can be computed

by ( ) time.

B. Generalization to Fast 2D DFRFT

Fact that 1D DFRFT can be said as the linear combination of DFT

and 2D DFT of a matrix with N rows and M columns can be achieved by

implementing M+N times 1D DFT, the 2D DFRFT fast algorithm can be

developed on the basis of the 1D DFRFT algorithm.

Thus, similar to 2D DFT, 2D DFRFT of a matrix with N rows and

M columns can be obtained by carrying out N times of 1D DFRFT row

transforms and M times of 1D DFRFT column transforms.

For a matrix × ( , ), ( , ) order of 2D DFRFT

× ( , ) can be obtained by the following two steps.

I. For each row in matrix × ( , ) calculate its th order 1D

DFRFT, then place the results of the transform as the original

row sequence to form a matrix which is marked as × ( , ).

II. For each column in × ( , ), calculate the th order 1D

DFRFT. Later place the results of the transform in the original

column sequence, thus the final result × ( , ) is obtained.

Page 10: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

124

As the 2D fast DFRFT algorithm mentioned above is based on the

FFT algorithm, its computing efficiency is equal to that of FFT, which means

the 2D DFRFT can compute a × sample in ( ) time.

In Medical image processing, compression plays a very important

role. This means minimizing the dimensions of the images to a processing

level. Image compression using transform coding provides significant results,

with fair image quality. The cut-off of the transform coefficients can be tuned

to bring out a negotiation between image quality and compression factor. To

use this approach, an image is initially partitioned into non-overlapped ×

(generally taken as 8x8 or 16 16) sub images. A Fast 2D-DFrFT is applied to

each block to transform the gray levels of pixels in the spatial domain into

coefficients in the frequency domain. The coefficients are normalized by

various scales based on the cut-off selected. At Decoder, the process of

encoding is simply reversed.

C. SPIHT Algorithm With Huffman Encoder For Image Compression

According to statistic analysis of the output binary stream of SPIHT

encoding, a simple and effective method combined with Huffman encode is

proposed for further compression.

SPIHT stands for “Set Partitioning in Hierarchical Trees”, is very

fast and effective one. In this method, more (wide-sense) zero trees are

efficiently found and represented by separating the tree root from the tree,

thereby, making compression more efficient. The image through the fractional

transform, the coefficients values in high frequency region are generally

small, hence, it will appear as "0" to quantify. SPIHT does not adopt a special

method to treat with it, but directly gives the output. A simple and effective

method combined with Huffman encode has been proposed in the present

research.

Page 11: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

125

D. SPIHT Algorithm With Huffman Encoder

1) First divide every output binary stream into 3 bits as a group;

111 000 111 000 100 000 010 101 100 00. In this process,

there will be remaining 0, 1, 2 bits that cannot participate.

Hence, in the head of the output bit stream of Huffman

encoding there are two bits to record the number of bits which

do not participate in the group and that remainder bits are

direct output in the end. Figure 6.6 shows the bit stream

structure of Huffman encoding.

Number of remain bits Bits Stream Remaining Bits

Figure 6.6 The Bit Stream Structure of Huffman Encoding

2) The emergence of statistical probability of each symbol

grouping results as follows,

P(‘000’)=0.3333 P(‘001’)=0

P(‘010’)=0.1111 P(‘011’)=0

P(‘100’)=0.2222 P(‘101’)=0.1111

P(‘110’)=0 P(‘111’)=0.2222

3) According to the above probability results, by applying

Huffman encoding the following code word book is obtained

as in Table 6.1. is obtained

Page 12: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

126

Table 6.1 Code Word Book Table

‘000’

‘001’

‘010’

‘011’

‘100’

‘101’

‘110’

‘111’

Through the above code book can get the corresponding output

stream; 10 00 01 00 01 11 01 1001 101 11 00, a total of 25 bits. The”10” in

the first is binary of remainder bits numbers. The last two bits “00” are the

result of direct output remainder bits. Compared with the original, bitstream

saves 4 bits. Decoding is the reverse process of the above mentioned process.

6.2.3. Decompression

This process is the reverse of the compression technique. After

SPIHT, it is necessary to transform the data to the original domain (spatial

domain). To do this, the Inverse Fractional Fourier Transform is applied first

in the columns and then in the rows.

A. Quasigroup Decryption with Hadamard and Number Theoretic

Transformation

As the Hadamard matrix operations are invertible, decryption of the

data can be performed by generating inverse Hadamard matrix. All the

matrices such as the Quasigroup, Hadamard Matrix and Number Theoretic

transform matrix have the same orders of matrices. The order used for all

Quasigroups, Hadamard and NTT is 16 since the input data stream is 16 bit.

Hadamard transforms and Number Theoretic transforms perform as

hash functions which produce diverse hash values for different input values as

‘01’

‘100000’

‘1001’

‘10001’

‘11’

‘101

‘10001’

‘00’

Page 13: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

127

stated by Satti & Kak (2009). There is a huge difference in the generated

random sequence if there is a one bit change in the input sequence.

6.3. HYBRID COMBINATION OF DISCRETE COSINE

TRANSFORM AND SET PARTITION IN HIERARCHICAL

TREE (DCTSPIHT) CODING ALOGRITHM FOR

MEDICAL IMAGE COMPRESSION

This approach comprises of the following phases namely

Encryption, Domain Transformation, DCTSPIHT algorithm is used for

compression and finally Quasigroup decryption with Hadamard and Number

Theoretic Transform.

Figure 6.7 Overall Flow of the Proposed DCTSPIHT Image Compression Approach

6.3.1. DCTSPIHT Algorithm for Image Compression

The sensitivity of Human eye to different frequencies is different

and especially it is highly sensitive to the image edge features. Thus, the

SPIHT algorithm has been used to improve the transformation process and to

increase the edge threshold. The human visual characteristics and SPIHT

algorithm pay more attention to image edge information. At the same time,

the DCT coding and SPIHT algorithm are combined to achieve hybrid DCT

and SPIHT coding.

Original DICOM Image

Quasi Group Encryption with Hadamard and Number Theoretic

Transformation DCTSPIHT Encoding

DCTSPIHT Decoding

Quasi Group Decryption with inverse Hadamard and Number

Theoretic Transformation Decompressed DICOM Image

Page 14: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

128

Figure 6.8 DCTSPIHT Algorithm Coding /Decoding Diagram

This DCTSPIHT algorithm combines two different techniques DCT

and SPIHT to achieve better image compression as every image consists of

low frequency and high frequency component. It is observed that, DCT is the

technique which is more efficient for low frequency component and SPIHT

gives a better result for high frequency component. In Figure 6.8, initially, the

original image is given through the DCT coding. After that, the wavelet

transformation of DCT output is created. This output is then encoded with

SPIHT technique, now the overall coded data is to be transmitted. In the

receiver side, the received data is to be decoded.

6.4. EXPERIMENTAL RESULTS

The same experimental setup used in the previous chapter has been

used in this approach.

A. Result Analysis for Fast 2D-Discrete Fractional Fourier Transform

and SPIHT Algorithm with Huffman Encoder

Three DICOM lung images are considered.

Page 15: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

129

Lung 1 Lung 2 Lung 3

Figure 6.9 DICOM Lung Test Images

Table 6.2 shows the comparison of the encryption and decryption

time between traditional RSA approach and the proposed Quasigroup

encryption with HTT and NTT approach.

It is clearly observed from the table that the proposed Quasigroup

approach takes lesser encryption and decryption time than RSA. For all the

standard images considered, the proposed Quasigroup attains lesser

encryption and decryption time.

Table 6.2 Comparison of Quasigroup Encryption and Decryption Time with HT and NTT

Standard Images

Modulus(bits)

Encryption Time Decryption Time

RSAQuasi Group

Encryption with HT and NTT

RSAQuasi Group

Encryption with HT and NTT

Lung 1 2048 3.105 1.412 102.54 31.681024 1.965 0.631 62.35 19.08512 1.510 0.42 31.54 05.89

Lung 2 2048 2.901 0.863 90.10 28.391024 1.789 0.45 53.47 16.07512 1.443 0.31 27.51 04.05

Lung 3 2048 2.936 1.255 91.64 29.051024 1.839 0.701 56.05 17.11512 1.493 0.410 29.69 05.68

Page 16: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

130

Table 6.3 shows the comparison of the PSNR value comparison of

the proposed Fast 2D-DFrFT and DCTSPIHT with the existing approaches

such as DFrFT, Wavelet Transform with SPIHT and D2 Transform Modified

SPIHT. It is observed that the proposed approach provides better PSNR value

when compared with the existing technique.

The highest PSNR value obtained is for Lung 3 image in the

proposed DCTSPIHT approach and the next higher PSNR value is obtained in

proposed Fast 2D-Discrete Fractional Fourier Transform with SPHIT with

Huffman Encoder. When considering 2 bpp, the two proposed approaches,

DCTSPIHT approach and Fast 2D-Discrete Fractional Fourier Transform

with SPHIT with Huffman Encoder attained PSNR of 41.82 and 40.09

respectively. However, the other approaches such as Wavelet Transform with

SPIHT and D2 Wavelet Transform with Modified SPIHT attain a much lesser

PSNR of 33.11 and 35.76 respectively.

Table 6.3 Comparison of PSNR value of the Proposed Hybrid Technique

Standard Images

Bit Per Pixel(Bpp)

Wavelet Transform

with SPIHT

D2 Wavelet Transform

withModifiedSPIHT

Proposed Fast2D-Discrete

Fractional Fourier Transform with

SPHIT with Huffman Encoder

ProposedDCTSPIHT algorithm

Lung 1 0.5 29.48 31.89 38.8 39.941 33.56 34.33 39.60 40.752 36.62 37.29 40.9 41.82

Lung 2 0.5 20.10 21.7 27.08 29.241 27.69 29 33.98 35.142 33.11 35.76 39.15 40.76

Lung 3 0.5 20.3 21.75 26.30 27.851 27.83 29.36 34.90 35.692 33.81 35.88 40.12 42.09

Page 17: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

131

Figure 6.10 PSNR Evaluation of the Proposed Hybrid Compression Technique for DICOM Images for 0.5 (Bpp)

Figure 6.10 is drawn for PSNR Evaluation of the Image

Compression Techniques for DICOM Images for 0.5 (Bpp). From the figure,

it is observed from the figure that the PSNR value of the proposed

DCTSPIHT algorithm approach is very high when compared with the existing

transformation approaches.

0

5

10

15

20

25

30

35

40

45

Lung 1 Lung 2 Lung 3

PSN

Rva

lue

(db)

Test Images for 0.5 bpp

Wavelet Transform with SPIHT

D2 Wavelet Transform with Modified SPIHT

Fast 2D-Discrete Fractiona Fourier Transform with SPHIT with Huffman Encoder DCTSPIHT algorithm2

Page 18: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

132

Figure 6.11 PSNR Evaluation of the Proposed Hybrid Compression Technique for DICOM Images for 1 (Bpp)

Figure 6.11 is drawn for PSNR Evaluation of the Image

Compression Techniques for DICOM Images for 1(Bpp). From the figure, it

is observed that the PSNR value of the proposed DCTSPIHT algorithm

approach is much higher than that of the existing transformation approaches.

0

5

10

15

20

25

30

35

40

45

Lung 1 Lung 2 Lung 3

PSN

R(d

b)

Test Images for 1 bpp

Wavelet Transform with SPIHTD2 Wavelet Transform with Modified SPIHTFast 2D-Discrete Fractiona Fourier Transform with SPHIT with Huffman Encoder DCTSPIHT algorithm2

Page 19: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

133

Figure 6.12 PSNR Evaluation of the Proposed Hybrid Compression Technique for DICOM Images for 2 (Bpp)

Figure 6.12 is drawn for PSNR Evaluation of the Image

Compression Techniques for DICOM Images for 2 (Bpp). From the figure, it

is observed that the PSNR value of the proposed DCTSPIHT algorithm

approach is much higher than that of the existing transformation approaches.

The MSE value comparison is shown in Table 6.4.

0

5

10

15

20

25

30

35

40

45

Lung 1 Lung 2 Lung 3

PSN

R(d

b)

Test Images for 2 bpp

Wavelet Transform with SPIHTD2 Wavelet Transform with Modified SPIHTFast 2D-Discrete Fractiona Fourier Transform with SPHIT with Huffman Encoder DCTSPIHT algorithm2

Page 20: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

134

Table 6.4 Comparison of MSE of the Proposed Hybrid Techniques

Standard Images

Bit Per Pixel(Bpp)

Wavelet Transform

withSPIHT

D2 Wavelet Transform

withModifiedSPIHT

Fast 2D-Discrete Fractional Fourier

Transform with SPHIT with

Huffman Encoder

ProposedDCTSPIHT algorithm

Lung 1 2 115.68 35.11 22.85 20.19Lung 2 2 114.52 33.14 20.16 18.82Lung 3 2 113.54 32.54 19.02 17.32

Figure 6.13 MSE Evaluation of the Proposed Hybrid Compression Technique for DICOM Images for 2 (Bpp)

From the Figure 6.13, it is observed that the MSE value of the

proposed DCTSPIHT algorithm approach is much less than the existing

transformation approaches.

0

20

40

60

80

100

120

140

Lung 1 Lung 2 Lung 3

MSE

Test Images for 2bpp

Wavelet Transform with SPIHTD2 Wavelet Transform with Modified SPIHTFast 2D-Discrete Fractiona Fourier Transform with SPHIT with Huffman Encoder DCTSPIHT algorithm

Page 21: CHAPTER 6 A SECURE FAST 2D-DISCRETE …shodhganga.inflibnet.ac.in/bitstream/10603/33563/11/11_chapter6.pdf · transformation have been described by Ramesh Babu Durai et al (2012).

135

6.5. SUMMARY

This chapter clearly discusses about the proposed Fast 2D-Discrete

Fractional Fourier Transform based Medical Image Compression using

SPIHT Algorithm with Huffman Encoder. The performance of this proposed

approach is compared with that of the various image compression techniques.

It is observed from the experimental results that the proposed Fast 2D-

Discrete Fractional Fourier Transform and SPIHT Algorithm with Huffman

Encoder provides the best results. However, in SPIHT, the image is first

converted into its wavelet transform and the wavelet coefficients are then fed

to the encoder. In DCTSPIHT, the input image has been subjected to DCT

coding. The output is then decomposed using biorthogonal wavelet

transform. This decomposed output is further compressed using SPIHT

encoding. There is a very wide range of practical uses that have large number

of image data to be transmitted. It is observed from the empirical result that

the proposed DCTSPHIT approach provides high PSNR values. Moreover,

MSE value of the proposed approach is also much lesser than that of the other

existing technique.