Next Article in Journal
Dietary Patterns and Nutritional Status in Relation to Consumption of Chickpeas and Hummus in the U.S. Population
Next Article in Special Issue
An Audio Distortion Dynamic Range Index for Evaluating the Performance of Audio Systems
Previous Article in Journal
High Accuracy Modeling for Solar PV Power Generation Using Noble BD-LSTM-Based Neural Networks with EMA
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Enhanced Adaptive Block Truncation Coding with Edge Quantization Scheme †

1
Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien 97401, Taiwan
2
Department of Computer Engineering, Sejong University, Seoul 05006, Korea
*
Author to whom correspondence should be addressed.
A preliminary conference version of this paper appeared under the title “Enhancing Image Compression by Adaptive Block Truncation Coding with Edge Quantization”, In Proceedings of the 2019 InternationalWorkshop on Smart Info-Media Systems in Asia (SISA 2019), Tokyo, Japan, September 2019; pp. 125–130.
These authors contributed equally to this work.
Appl. Sci. 2020, 10(20), 7340; https://doi.org/10.3390/app10207340
Submission received: 22 September 2020 / Revised: 11 October 2020 / Accepted: 14 October 2020 / Published: 20 October 2020
(This article belongs to the Special Issue Research on Multimedia Systems)

Abstract

:
Recently, image compression using adaptive block truncation coding based on edge quantization (ABTC-EQ) was proposed by Mathews and Nair. Their approach deals with an image for two types of blocks, edge blocks and non-edge blocks. Different from using the bi-clustering approach on all blocks in previous block truncation coding (BTC)-like schemes, ABTC-EQ adopts tri-clustering to tackle edge blocks. The compression ratio of ABTC-EQ is reduced, but the visual quality of the reconstructed image is significantly improved. However, it is observed that ABTC-EQ uses 2 bits to represent the index of three clusters in a block. We can only use an average of 5/3 bits by variable-length code to represent the index of each cluster. On the other hand, there are two observations on the quantization levels in a block. The first observation is that the difference between the two quantization values is often smaller than the quantization values themselves. The second observation is that more clusters may enhance the visual quality of the reconstructed image. Based on variable-length coding and the above observations, we design variants of ABTC-EQ to enhance the visual quality of the reconstructed image and compression ratio.

1. Introduction

Rapid improvements in the area of network and information technology increase the services of digital multimedia, especially digital image, in today’s digitalized and information world. For example, consider storage and transmission. File compression reduces the amount of space needed to store data, and also speeds the time to send over the Internet. About compressing digital images, there are two main types of compressing digital images, lossless and lossy. In this paper, we deal with block truncation coding (BTC) and its variants [1,2,3,4], which are lossy compression algorithms. Because of their stable compression rates and low computation efforts, BTC-like schemes are widely used in cryptography, e.g., data hiding [5,6,7,8,9], watermarking [10], secret image sharing, and visual cryptography [11,12,13,14].
The BTC was first proposed by Delp and Mitchell [1]. It is a block-based lossy image compression technique for grayscale or color images, where a quantizer is adopted to reduce the number of gray levels in each block. An image is subdivided into non-overlapping blocks. Then, each block is coded by the mean, the standard deviation, and the bit map consisting of 0’s and 1’s. Suppose that a block size has ( 4 × 4 ) pixels, and then these 16 pixels (i.e., 128 bits) can be represented by a trio with (8 + 8 + 16) = 32 bits. That is, 16 pixels are represented as two quantization levels and a bitmap. Therefore, the compression ratio (CR) of BTC is determined from CR = ( 16 × 8 )/32 = 4 for this case. BTC provides a good compression ratio without degrading the visual quality of the reconstructed image much. However, the processing time for BTC algorithm has significant computational complexity, and thus it is not generally recommended for time-consuming applications.
In [2], Lema and Mitchell proposed absolute moment BTC (AMBTC), a variation of BTC, which has a simple computation. AMBTC adopts bi-clustering approach, and thus still uses two quantization levels in a block like BTC. Afterwards the authors in [3] proposed a modified BTC (MBTC) to further enhance the visual quality of the reconstructed image by using the so-called max-min quantizer. Because of using the simple bi-clustering approach in AMBTC and MBTC, the details near edges will be removed from the reconstructed image. As we know, edges are important information for human visual perception. Moreover, the information of edges is also necessary for some image processing applications, e.g., pattern recognition and optical character recognition. Therefore, the loss of details near edges will compromise the availability of BTC-like compression, and this leads to motivation for designing an edge-based BTC compression algorithm. Recently, Mathews and Nair proposed an adaptive BTC based on edge quantization (ABTC-EQ) [4].
The authors first use edge detector to divide an image into edge blocks and non-edge blocks. Afterward, by applying MBTC on non-edge blocks, and adopting tri-clustering algorithm to tackle edge blocks, ABTC-EQ may provide the better visual quality of the reconstructed image, but has the less compression ratio when compared with AMBTC or MBTC. This is because edge blocks have to use three pixels to represent the quantization values for three clusters. However, it is observed that ABTC-EQ uses 2 bits to represent the index of each cluster.
Compared with existing ABTC-EQ [4], MBTC [3], and AMBTC [1], the proposed enhanced ABTC-EQ method takes full advantage of the image compression and achieves a higher image quality. The main contributions of this paper are as follows: (1) The proposed method improves the compression rate by using a variable-length code to represent the index of each cluster. As a result, we can only use an average of 5/3 bits. That is, our proposed method less compression ratio when compared with AMBTC or MBTC. (2) Increasing the number of quantization levels improves image quality, but degrades compression efficiency. For this problem, we reduce the number of bits by using the difference between the quantization levels for three or more quantization levels. (3) The proposed method enhances the visual quality of the reconstructed image by exploiting the edges of a compressed image. Variable-length coding used for our method enable to enhance the peak signal-to-noise ratio (PSNR) and CR.
The rest of this paper is organized as follows. Section 2 briefly reviews AMBTC, MBTC, and Mathews and Nair’s ABTC-EQ. The proposed ABTC-EQ with theoretical analyses are formulated in Section 3. Experimental results and discussions are given in Section 4. Section 5 draws some conclusions.

2. Previous Works

2.1. AMBTC and MBTC

In [2], Lema and Mitchell propose AMBTC, the variation of BTC, which has a simple computation. Compared with BTC, it requires less computation time. AMBTC still preserves the higher mean and lower mean of each block and uses these two values to quantize output. It provides better image quality than BTC, as well as reasonable computational complexity. In AMBTC, an image is first subdivided into non-overlapping ( k × k )-sized blocks, where k may be set to be ( 4 × 4 ), ( 6 × 6 ), ( 8 × 8 ) and so on. AMBTC adopts block-wise operation. For each block, the mean pixel value x ¯ is calculated by
x ¯ = 1 k × k i = 1 k 2 x i
where x i denotes the i-th pixel in this block. Each pixel value x i is compared with the mean value x ¯ using Equation (2). If x i is greater than or equal to x ¯ , b i becomes 1, otherwise b i becomes 0. That is, a bitmap M = [ b i ] of the same block size which consists of two clusters is generated.
b i = 1 , if x i x ¯ , 0 , if x i < x ¯ .
AMBTC preserves two quantization values per block and the higher mean and the lower mean. Equation (3) describes the method of generating two quantized values in each block. Here, t denotes the number of “1” in each bitmap M, i.e., the number of pixels under x i x ¯ . · is the floor function is the function that takes as input as real number x, and gives as output the greatest integer less than or equal to x, denoted floor(x), or x . The means μ 1 and μ 0 are, respectively, the higher and lower means based on x ¯ .
μ 1 = 1 t x i x ¯ x i and μ 0 = 1 ( k × k ) t x i < x ¯ x i .
Finally, a block of the image is compressed into two quantization levels ( μ 0 , μ 1 ) and bitmap M, i.e., trio ( μ 0 , μ 1 , M ) . A bitmap M contains the bit-planes that represent the pixels, and the values μ 0 and μ 1 are used to decode the AMBTC compressed image. For the case k = 4 , i.e., we deal with an image by ( 4 × 4 ) block-wise operation. Sixteen pixels in a block are represented as a trio ( μ 0 , μ 1 , M ) of 8 + 8 + 16 = 32 bits, and thus the CR is ( 16 × 8 )/32 = 4. Consider the example of a 512 × 512 -pixel image. The file size of 2 M bits can be reduced to 0.5 M bits. In decoding phase, when two quantization levels and the bitmap obtained, the corresponding image block can be easily reconstructed by replacing every “1” in a bitmap M with μ 1 , while every “0” is replaced with μ 0 .
Because AMBTC provides better image quality and the fast computation, most BTC-based data hiding schemes and secret image sharing schemes adopt AMBTC approach. In [3], the authors proposed a MBTC by using max-min quantizer to further enhance the quality of reconstructed image. In AMBTC, the threshold value used for distinguishing two clusters is simply using the mean value x ¯ in a block. A threshold value x t h of MBTC in Equation (4) is obtained by calculating the average value of the maximum value ( x m a x ), minimum value ( x m i n ), and mean value ( x ¯ ) in a block.
x t h = ( x m a x + x m i n + x ¯ ) 3 .
Afterwards, by the same argument of AMBTC but using x t h instead of x ¯ , we may obtain a trio for each block in MBTC.

2.2. Mathews and Nair’s ABTC-EQ

In previous BTC and its variants, e.g., AMBTC and MBTC, the quantization approaches are all the same. They all use bi-clustering approaches (two quantization levels) in all blocks. ABTC-EQ is an edge-based block truncation scheme. Its quantization is based on the edge information. In ABTC-EQ, we find the edged image from the given input image by Canny edge detector [15], where the process of the detection algorithm is composed of 4 different steps: (1) smooth the image with Gaussian filter to remove the noise. (2) find the intensity gradients of the image using finite-difference approximations for the partial derivatives. (3) apply non-maximum suppression to the gradient magnitude. (4) use the double thresholding algorithm to determine potential edges. For a block of the edge map (bitmap) E = [ e i ] (sized ( k × k ) ) obtained from the given input image based on the process, we classify the block into an edge block or a non-edge block using the criteria. That is if all pixel values in the block E are ‘0’, it classifies to a non-edge block, otherwise, it classifies to an edge block. Notes: The image created after applying the edge detector algorithm is a bitmap and includes edges representing the shape of objects. By applying this feature, the set of blocks may be classified into edge blocks or non-edge blocks.
For these two types of blocks, we use various quantization approaches. In case of non-edge blocks, we use MBTC. Therefore, a non-edge image block can be represented as a trio ( μ 0 , μ 1 , M n ) , where we intentionally use M n notation to represent a bit map for the non-edge block. On the other hand, for edge blocks, we use tri-clustering approach. The pixels in a block are classified into three clusters ( c 0 , c 1 , c 2 ) , which similar pixels are grouped into the same cluster, by k-means clustering algorithm [16]. A bitmap M e = [ b i ] of the edge block is generated by Equation (5).
b i = 00 , if x i c 0 , 01 , if x i c 1 , 10 , if x i c 2 .
The mean value μ i of each cluster c i , 0 i 2 , is calculated with Equation (6), where μ 0 μ 1 μ 2 . Thus, an edge image block is represented as ( μ 0 , μ 1 , μ 2 , M e ) .
μ i = 1 | c i | x i c i x i , 0 i 2 .
Bi-clustering and tri-clustering approaches are performed for non-edge blocks and edge blocks, respectively. To discriminate edge blocks from non-edge blocks, an identifier flag f should be defined and assigned with the value 0 (respectively, 1) for the edge block (respectively, non-edge block). Finally, k 2 pixels may be represented as ( f = 1 , μ 0 , μ 1 , M n ) or ( f = 0 , μ 0 , μ 1 , μ 2 , M e ) . Therefore, the CR of ABTC-EQ is dynamic not static like previous BTC schemes.

3. The Proposed ABTC-EQ

3.1. Design Concept

The advantage of ABTC-EQ [4] is to improve the quality of the reconstructed image because it can represent edge and non-edge blocks. However, it is impossible that BTC and its variants cannot represent edge block, because they only use two quantization levels, ( μ 0 , μ 1 , M ) , to represent a block. However, ABTC-EQ enhances the visual quality of the reconstructed image as well as reduces the CR due to using an extra flag bit f and extra quantization value μ 2 . To enhance BTC-like approaches, we obviously should improve the CR as well as with a high PSNR. As a result of studying the ABTC-EQ, it was found that the PSNR improvement of the reconstructed image was due to the tri-clustering approach to the edge block. The weakness of this approach is that the CR decreases due to the increase of the additional bits to represent the edge block. Some in-depth observations on ABTC-EQ are listed below.
Observation 1.
It is not necessary to use two bits to represent a pixel (i.e., ‘00’, ‘01’, and ‘10’) in bit map M e for edge block.
As shown in Equation (5), we use (00), (01), and (10) for three clusters c 0 , c 1 , and c 2 , respectively. However, we may use Huffman code, a variable-length code, to represent three clusters, by (0), (10), and (11) with average length 5/3 bits for clusters c 0 , c 1 , and c 2 . Note: the Huffman code can be uniquely decoded. By this approach, the size of bit map M e is reduced from 2 k 2 to ( 5 / 3 ) / k 2 . Finally, the CR can be enhanced.
Observation 2.
Consider two quantization values (say μ i and μ j , where μ i < μ j ). The difference ( μ j μ i ) between two quantization values is often smaller than the quantization values μ i and μ j themselves.
By observing quantization value, we herein use a homologous way to describe the difference between two quantization values with the help of the coder in converting voice. A well-known coder, differential pulse code modulation (DPCM), is described as follows: obtain the pulse of analog signals by sampling and then convert the difference of pulses into binary sequences using the non-uniform coding scale. This property is also true for the quantization levels in ABTC-EQ, i.e., the large difference of quantization values does not occur frequently. Thus, we could carefully design our quantization ranges for the small difference between two quantization values.
Observation 3.
More clusters may enhance the PSNR of the reconstructed images.
In previous BTC-like schemes, all blocks adopt bi-clustering, i.e., using two quantization ranges for each block. Mathews and Nair’s ABTC-EQ performed a tri-clustering approach on edge blocks. Because there are three values μ 0 , μ 1 , and μ 2 to approximate the pixel grayscale values, it can reduce the mean square error. We may use more clusters (say four clusters) to more precisely approximate pixel values.

3.2. The Proposed Schemes

We aim to achieve the high CR and the reasonable PSNR of the reconstructed image. For the purpose, we proposed three schemes: (1) Scheme A motivated from Observation 1, (2) Scheme B is based on Observations 1 and 2, and (3) Scheme C is based on Observations 2 and 3. Compared with Mathews and Nair’s ABTC-EQ [4], Scheme A has the same PSNR, while enhances the CR. However, Scheme C has the same CR, while enhances the PSNR. On the other hand, Scheme B further enhances the CR than Scheme A but still retain a reasonable PSNR compared with AMBTC [2] and MBTC [3].
(1) Scheme A: The algorithm is the same as that of ABTC-EQ. If a block belongs to the edge block as described in Observation 1, the bitmap ( M e ) is composed of {‘0’, ‘01’, ‘10’} (see Equation (7)). In this case, we show the compression performance of the bitmap when a variable-length coding is applied to the bitmap. The proof is demonstrated by the Equations (8) and (9). Finally, we use ( f = 0 , μ 0 , μ 1 , μ 2 , M e ) for an edge block.
b i = 0 , if x i c 0 , 01 , if x i c 1 , 10 , if x i c 2 .
Theorem 1.
Suppose that the percentages of edge blocks and non-edge blocks in an image be p e and p n , where p e + p n = 1 , when dealing with ( k × k ) -pixel block in an image. The CR of ABTC-EQ is CRMN = 8 k 2 ( 17 + k 2 ) + ( 8 + k 2 ) × p e , and Scheme A has the CRA = 8 k 2 ( 17 + k 2 ) + ( 8 + ( 2 k 2 / 3 ) ) × p e , where CRA> CRMN. Meanwhile, they have the same PSNR of reconstructed image, i.e., PSNRMN = PSNRA.
Proof. 
By the compression data formats ( f = 1 , μ 0 , μ 1 , M n ) and ( f = 0 , μ 0 , μ 1 , μ 2 , M e ) of ABTC-EQ, and the formats of Scheme A ( f = 1 , μ 0 , μ 1 , M n ) and ( f = 0 , μ 0 , μ 1 , μ 2 , M e ) , we may easily derive CRMN and CRA in Equations (8) and (9), respectively.
CR MN = 8 × k 2 ( 1 + 2 × 8 + k 2 ) × p n non-edge block + ( 1 + 3 × 8 + 2 × k 2 ) × p e edge block = 8 k 2 ( 17 + k 2 ) + ( 8 + k 2 ) × p e
CR A = 8 × k 2 ( 1 + 2 × 8 + k 2 ) × p n non-edge block + ( 1 + 3 × 8 + ( 5 / 3 ) × k 2 ) × p e edge block = 8 k 2 ( 17 + k 2 ) + ( 8 + ( 2 k 2 / 3 ) ) × p e
By Equations (8) and (9), since ( 8 + ( 2 k 2 / 3 ) ) < ( 8 + k 2 ) ) we obviously have CRA> CRMN. Except using different bit map M e from M e , Scheme A uses the same approaches of ABTC-EQ. Thus, both schemes have the same PSNR, i.e., PSNRMN = PSNRA. Notes: In Equations (8) and (9), ( 1 + 2 × 8 + k 2 ) represents data format of the edge block, i.e., “1” is a flag bit, “ 2 × 8 ” is 2 pixels × 8 bits (two quantization levels), and “ k 2 ” is k × k × 1 bits (bitmap) in non-edge block. In each block, ( 1 + 3 × 8 + 2 × k 2 ) denotes the format of the non-edge block, i.e., “ 3 × 8 ” is 3 pixels × 8 bits and “ 2 × k 2 ” is k × k × 2 bits in edge block. The 5/3 of Equation (9) indicates that the number of cluster is 3 and the total bit length is 5 when a block belongs to an edge block. By this approach, the size of bit map M e is reduced from 2 k 2 to ( 5 / 3 ) / k 2 . Finally, we proved that the CR performance is enhanced by Scheme A.  □
(2) Scheme B: Basically, this scheme is based on the compressed bitmap M e = [ b i ] derived from Observation 1. Moreover, as explained in Observation 2, a new compressed quantization levels ( δ 0 , δ 1 , δ 2 ) is exploited. This is derived from the idea that compression performance can be improved by exploiting the difference between the two quantization levels. For this, we define a way of classifying the range of quantization levels into four categories. That is, for the tri-cluster δ i , 0 i 2 , we use n i bits with a radix R i : ( r n i , r n i 1 , , r 1 ) to represent its quantization levels.
( I ) ( n 0 = 7 , n 1 = 7 , n 2 = 7 ) with R 0 : ( r 7 , r 6 , , r 1 ) = ( 128 64 32 16 8 4 2 ) , R 1 : ( r 7 , r 6 , , r 1 ) = ( 64 32 16 8 4 2 1 ) , R 2 : ( r 7 , r 6 , , r 1 ) = ( 64 32 16 8 4 2 1 ) . ( I I ) ( n 0 = 6 , n 1 = 6 , n 2 = 6 ) with R 0 : ( r 6 , r 5 , , r 1 ) = ( 128 64 32 16 8 4 ) , R 1 : ( r 6 , r 5 , , r 1 ) = ( 64 32 16 8 4 2 ) , R 2 : ( r 6 , r 5 , , r 1 ) = ( 64 32 16 8 4 2 ) . ( I I I ) ( n 0 = 5 , n 1 = 5 , n 2 = 5 ) with R 0 : ( r 5 , r 4 , , r 1 ) = ( 128 64 32 16 8 ) , R 1 : ( r 5 , r 4 , , r 1 ) = ( 64 32 16 8 4 ) , R 2 : ( r 5 , r 4 , , r 1 ) = ( 64 32 16 8 4 ) . ( I V ) ( n 0 = 4 , n 1 = 4 , n 2 = 4 ) with R 0 : ( r 4 , r 3 , , r 1 ) = ( 128 64 32 16 ) , R 1 : ( r 4 , r 3 , , r 1 ) = ( 64 32 16 8 ) , R 2 : ( r 4 , r 3 , , r 1 ) = ( 64 32 16 8 ) .
The new quantization levels due to the tri-cluster, δ i , 0 i 2 , is then iteratively determined based on radix R i with the equation m i n { μ i j = 0 i δ j } . Finally, we obtain new quantization levels ( f = 0 , δ 0 , δ 1 , δ 2 , M e ) for an edge block. This process can greatly reduce the bits of the quantization level.
Theorem 2.
Suppose that the percentages of edge blocks and non-edge blocks in an image be p e and p n , where p e + p n = 1 , when dealing with ( k × k ) -pixel block in an image. Scheme B has the CRB = 8 k 2 ( 17 + k 2 ) + ( i = 1 3 n i ( 2 k 2 / 3 ) ) × p e , and CRB-IV> CRB-III> CRB-II> CRA.
Proof. 
By the compression data formats of Scheme B ( f = 1 , μ 0 , μ 1 , M n ) and ( f = 0 , δ 0 , δ 1 , δ 2 , M e ) , we may derive in Equation (11).
CR B = 8 k 2 ( 1 + 2 × 8 + k 2 ) × p n ) non-edge block + ( 1 + i = 1 3 n i + ( 2 / 3 ) × k 2 ) × p e edge block = 8 k 2 ( 17 + k 2 ) + ( i = 1 3 n i 16 + ( 2 k 2 / 3 ) ) × p e
Via Equation (11) and four quantization ranges in Equation (10), we have compression ratios for these four quantization ranges CRB-I = 8 k 2 ( 17 + k 2 ) + ( 5 + ( 2 k 2 / 3 ) ) × p e , CRB-II = 8 k 2 ( 17 + k 2 ) + ( 2 + ( 2 k 2 / 3 ) ) × p e , CRB-III = 8 k 2 ( 17 + k 2 ) + ( ( 2 k 2 / 3 ) 1 ) × p e , and CRB-IV = 8 k 2 ( 17 + k 2 ) + ( ( 2 k 2 / 3 ) 4 ) × p e . From the above and Equation (9), we have CRB-IV > CRB-III> CRB-II> CRB-I> CRA. □
All compression ratios of Scheme B are larger than CRMN (ABTC-EQ). By Observation 3, we may obtain the approximated ( μ 0 , μ 1 , μ 2 ) with a tolerant distortion from ( δ 0 , δ 1 , δ 2 ) . Moreover, Scheme B may have the higher PSNR than those of AMBTC and MBTC.
(3) Scheme C: As the number of clusters for a block increases, the PSNR of an image increases proportionally like the case of Observation 3. In this scheme, four clusters ( c 0 , c 1 , c 2 , c 3 ) are introduced for edge blocks and the bitmap ( M e = [ b i ] ) shown in Equation (12) is used. The mean μ i of each cluster c i , 0 i 3 , is calculated with Equation (13), where μ 0 μ 1 μ 2 μ 3 . Moreover, via Observation 2, we use a new quantization levels ( δ 0 , δ 1 , δ 2 , δ 3 ) to represent ( μ 0 , μ 1 , μ 2 , μ 3 ) . Here, the quantization range is defined like Equation (14) and the value δ i , 0 i 3 is then iteratively determined based on radix R i with the the criteria min { μ i j = 0 i δ j } . Finally, we use new format ( f = 0 , δ 0 , δ 1 , δ 2 , δ 3 , M e ) for an edge block. Scheme C is a method to improve image quality while maintaining the same level of compression as ABTC-EQ, and here, it is proved that the compression ratios of Scheme C and ABTC-EQ are the same for this case.
b i = 00 , if x i c 0 , 01 , if x i c 1 , 10 , if x i c 2 , 11 , if x i c 3 .
μ i = 1 | c i | x i c i x i , 0 i 3 .
( n 0 = 6 , n 1 = 6 , n 2 = 6 , n 3 = 6 ) with R 0 : ( r 6 , r 5 , , r 1 ) = ( 128 64 32 16 8 4 ) , R 1 : ( r 6 , r 5 , , r 1 ) = ( 64 32 16 8 4 2 ) , R 2 : ( r 6 , r 5 , , r 1 ) = ( 32 16 8 4 2 1 ) , R 3 : ( r 6 , r 5 , , r 1 ) = ( 32 16 8 4 2 1 ) .
Theorem 3.
Suppose that the percentages of edge blocks and non-edge blocks in an image be p e and p n , where p e + p n = 1 , when dealing with ( k × k ) -pixel block in an image. Scheme C has the CRC = 8 k 2 ( 17 + k 2 ) + ( 8 + k 2 ) × p e , where CRC = CRMN.
Proof. 
By the compression data formats of Scheme C ( f = 1 , μ 0 , μ 1 , M n ) and ( f = 0 , δ 0 , δ 1 , δ 2 , δ 3 , M e ) , we may easily derive CRC in Equation (15).
CR C = 8 × k 2 ( 1 + 2 × 8 + k 2 ) × p n ) non-edge block + ( 1 + i = 1 4 n i + 2 × k 2 ) × p e edge block = 8 k 2 ( 17 + k 2 ) + ( 24 16 + k 2 ) × p e ( i = 1 4 n i = 24 via Equation ( 14 ) ) = 8 k 2 ( 17 + k 2 ) + ( 8 + k 2 ) × p e = CR MN
 □

3.3. Examples

An example, dealing with a ( 4 × 4 )-pixel image block, is given in this sub section to easily understand all proposed schemes: Scheme A, Scheme B-I ∼ Scheme B-IV, and Scheme C. Moreover, we will show the stored bits for this block and average mean square error (AMSE) of a single block for all prosed schemes, and the AMBTC, MBTC, and ABTC-EQ.
Suppose that a ( 4 × 4 )-pixel image block is 124 89 124 60 135 114 120 86 120 144 68 82 100 104 55 78 . Obviously, by using AMBTC [2], this block can be represented as a compressed trio (77, 123, 1010111011000100), which has to store 32 bits for this block and the AMSE is 167.56. The trio is ( 74 , 120 , 101011101100 1 ̲ 100 ) when using MBTC, which differs with clustering the thirteen pixel in this block, and its AMSE is slightly reduced as 160.44.
Example 1.
Compress the image block by Scheme A.
By Canny edge detector, we first find out the edge map E = 0 0 0 0 0 0 1 0 0 1 1 0 0 0 0 0 .
According to the definition of an edge block, this image block is an edge block. We then obtain three clusters from these 16 pixels of block via k-means clustering algorithm, and assign (0), (10), and (11) for each cluster to establish a bit map M e = 11 10 11 0 11 11 11 10 11 11 0 10 10 10 0 10 .
Via Equation (7), we determine μ 0 = 61 , μ 1 = 89 , and μ 2 = 125 . Therefore, the compressed data ( f = 0 , μ 0 , μ 1 , μ 2 , M e ) is (0, 61, 89, 125, 11101101111111011110101010010) of 54 bits. Moreover, the AMSE is 77.81. Mathews and Nair’s ABTC-EQ uses ( f = 0 , μ 0 , μ 1 , μ 2 , M e ) with the same ( μ 0 , μ 1 , μ 2 ) , and thus it has the same AMSE. However, it uses the bit map M e of 32 bits and it requires a total of 57 bits to store this block. Therefore, we showed that Scheme A provides an advantage to reduce 3-bit in compression of the block compared to ABTC-EQ.
Example 2.
Compress the image block by Scheme B.
Consider using the quantization range in Scheme B-I. By the range R 0 = ( 128 64 32 16 8 4 2 ) and the condition satisfying min{ μ 0 δ 0 }, we derive δ 0 = 60 ; by the range R 1 = ( 64 32 16 8 4 2 1 ) and the condition satisfying min{ μ 1 δ 1 δ 0 }, we derive δ 1 = 29 ; by the range R 2 = ( 64 32 16 8 4 2 1 ) and the condition satisfying min{ μ 2 δ 2 δ 1 δ 0 }, we derive δ 2 = 36 . Therefore, the compressed data ( f = 0 , δ 0 , δ 1 , δ 2 , M e ) is (0, 60, 29, 36, 11101101111111011110101010010) of 51 bits ( | δ 0 | + | δ 1 | + | δ 2 | = 21 bits). In reconstruction phase, the recovered values of are (60, 89, 125). Thus, the AMSE = 78 is slightly larger than that of Scheme A.
Consider using the quantization range in Scheme B-II. By the same argument of Scheme B-I, we may derive ( δ 0 = 60 , δ 1 = 28 , δ 2 = 36 ) . The recovered values of ( μ 0 , μ 1 , μ 2 ) are (60, 88, 124). Thus, Scheme B-II has AMSE=80.19, but further reduces the compressed data to 48 bits.
When using quantization ranges of Scheme B-III and Scheme B-IV, we have and ( δ 0 = 64 , δ 1 = 24 , δ 2 = 36 ) and ( δ 0 = 64 , δ 1 = 24 , δ 2 = 40 ) , respectively. In reconstruction, Scheme B-III and Scheme B-IV can recover ( μ 0 , μ 1 , μ 2 ) = (64, 88, 124) and ( μ 0 , μ 1 , μ 2 ) = (64, 88, 128). Finally, Scheme B-III (respectively, Scheme B-IV) has AMSE=81.69 (respectively, 82.19) and stores 45 (respectively, 42) bits for this block.
Example 3.
Compress the image block by Scheme C.
By k-means clustering algorithm, we subdivide this block into four clusters, and assign (00), (01), (10), and (11) for each cluster to establish bit map M e = 10 01 10 00 11 10 10 01 10 11 00 01 10 10 00 01 . Via Equation (13), we determine μ 0 = 61 , μ 1 = 83 , μ 2 = 115 and μ 3 = 139 . Using quantization range in Scheme C, by the range R 0 = ( 128 64 32 16 8 4 ) and the condition satisfying min{ μ 0 δ 0 }, we derive δ 0 = 60 ; by the range R 1 = ( 64 32 16 8 4 2 ) and the condition satisfying min{ μ 1 δ 1 δ 0 }, we derive δ 1 = 22 ; by the range R 2 = ( 32 16 8 4 2 1 ) and the condition satisfying min{ μ 2 δ 2 δ 1 δ 0 }, we derive δ 2 = 33 ; by the range R 3 = ( 32 16 8 4 2 1 ) and the condition satisfying min{ μ 2 δ 3 δ 2 δ 1 δ 0 }, we derive δ 3 = 24 .
Thus, the compressed data ( f = 0 , δ 0 , δ 1 , δ 2 , δ 3 , M e ) is (0, 60, 22, 33, 24, 100110001110100 11011000110100001) of 57 bits ( | δ 0 | + | δ 1 | + | δ 2 | + | δ 3 | = 24 bits), which is the same as Mathews and Nair’s ABTC-EQ (see Example 1). In reconstruction phase, the recovered values of ( μ 0 , μ 1 , μ 2 , μ 3 ) are (60, 82, 115, 139). Thus, the AMSE is 48.13.
The AMBTC has the worst AMSE = 167.56, but it needs the least bits (32 bits) for representing a block. The above three examples imply that the AMSE = 48.13 of Scheme C is much lesser than those of other schemes (note: this significant improvement comes from the quad-clustering approach), and its number of required bits is the same as ABTC-EQ. Compared with ABTC-EQ, Scheme A has the same AMSE but has fewer bits for a block. About Scheme B, it can make a trade of the number of required bits for AMSE. For example, Scheme B-IV only needs 42 bits for a block, and meanwhile, the AMSE = 82.19 is far less than AMSE = 167.56 of AMBTC.

4. Experiment and Comparison

4.1. Experimental Results

Five test images, Lena, Butterfly, Cameraman, Lake, and Peppers are used for evaluating all BTC-like schemes: AMBTC, MBTC, ABTC-EQ, and the proposed schemes (Scheme A, Scheme B and Scheme C). To properly deal with all ( k × k ) blocks, where k = 4 , 6 and 8, we use all test images of the size 504 × 504 pixels. The evaluation metrics, PSNR, CR, structural similarity (SSIM) index, and feature similarity (FSIM) index, are used to compare the performance of all these schemes. Table 1 illustrates the comparison of all BTC-like Schemes. For the test image Lena, consider dealing with ( 4 × 4 ) blocks by all schemes.
Scheme C adopts quad-clustering, and also uses 24 bits to represent four quantization values by the approach of using difference. Therefore, Scheme C has the best visual quality (PSNR = 39.62 dB) and meanwhile has the same CR = 3.09 as ABTC-EQ. While AMBTC and MBTC have high CR, they have poor PSNR because they only use the bi-clustering approach. The PSNR = 33.87 dB of MBTC is slightly greater than the PSNR = 33.42 dB of AMBTC. This slight enhancement comes from using the more precise threshold value for MBTC.
Scheme A uses tri-clustering and same quantization ranges like ABTC-EQ, and thus Scheme A and ABTC-EQ have the same PSNR = 37.49 dB. Because of using a variable-length code to record the index of the cluster, Scheme A has a higher CR = 3.24 than the CR = 3.09 of ABTC-EQ. On the other hand, Scheme B may trade-off PSNR for CR by using different quantization ranges. Scheme B-I has PSNR = 37.47 dB almost the same to PSNR = 37.49 dB of ABTC-EQ, and has the higher CR than Scheme A. If we want to achieve a high CR and meanwhile retain a moderate PSNR, we may choose Scheme B-IV, which has the CR = 3.62 PSNR = 35.96 dB. Moreover, all the values of SSIM and FSIM demonstrate consistency with the performance of PSNR.
For simplicity, we only show experimental results for Lena. The original image is given in Figure 1a, and the reconstructed images from AMBTC, MBTC, ABTC-EQ, Scheme A, Scheme B-I, Scheme B-II, Scheme B-III, Scheme B-IV, and Scheme C using ( 4 × 4 ) blocks are, respectively, illustrated in Figure 1b–j. Scheme C (Figure 1j) has the best PSNR 39.62 dB.
ABTC-EQ and the proposed schemes deal with edged blocks and thus may have better performance near edges. The edge images of the original image Cameraman and the reconstructed images from AMBTC, MBTC, ABTC-EQ, and Scheme C are shown in Figure 2. The non-edge based schemes (AMBTC and MBTC) do not retain the details of selected portions, as shown in the dashed circle. However, both Scheme C and ABTC-EQ have better details. Moreover, it is observed that Scheme C demonstrates more edges in the circle area than ABTC-EQ. Scheme C depicts the improvement in the visual quality near edges, and its edge image is very similar to the original image.

4.2. Discussion

We further discuss three important issues in-depth: (i) the visual quality of reconstructed image, i.e., PSNR, (ii) the size of a compressed rate, i.e., CR, and (iii) an appropriate way of using Scheme A, Scheme B, and Scheme C for applications.
(1) Visual Quality of Reconstructed Image:
In Schemes B and C, we adopt various quantization range for each cluster. Scheme B has three quantization ranges R i for δ i , 0 i 2 , while Scheme C has four quantization ranges R i for δ i , 0 i 3 . Consider Scheme C with four ranges R 0 = ( 128 64 32 16 8 4 ) , R 1 = ( 64 32 16 8 4 2 ) , R 2 = ( 32 16 8 4 2 1 ) , and R 3 = ( 32 16 8 4 2 1 ) . By the definition μ 0 = δ 0 , we have the quantization error ± 2 ( R 0 can represent the values 0, 4, 8, …, and 252). Because of μ 1 = δ 0 + δ 1 = μ 0 + δ 1 with minimum distortion, if the values of quantization range R 1 can catch up the difference δ 1 then the quantization error of μ 1 is ± 1 ( R 1 can represent the values 0, 2, 4, …, and 126). By the same argument, we have no quantization errors for μ 2 and μ 3 , because R 2 and R 3 can represent the values 0 , 1 , 2 , , and 63.
Therefore, when comparing with the original values of four clusters ( c 0 , c 1 , c 2 , c 3 ) , our recovered values have very small distortion. In Example 3, the original values are ( μ 0 , μ 1 , μ 2 , μ 3 ) = ( 61 , 83 , 115 , 139 ) , and the recovered values are (60, 82, 115, 139), almost the same to the original one. For this case, we still use 24 bits to represent four quantization values, which are the same to ABTC-EQ using 24 bits to represent three quantization values.
By using the above analysis, we may derive quantization errors of ( μ 0 , μ 1 , μ 2 ) for Schemes B-I, B-II, B-III and B-IV as ( ± 1 , 0 , 0 ) , ( ± 2 , ± 1 , ± 1 ) , ( ± 4 , ± 2 , ± 2 ) , and ( ± 8 , ± 4 , ± 4 ) , respectively. For the original values ( μ 0 , μ 1 , μ 2 ) = ( 61 , 89 , 125 ) , Example 2 demonstrates that the recovered values for Schemes B-I, B-II, B-III and B-IV are (60, 89, 125), (60, 88, 124), (64, 88, 124) and (64, 88, 128). These recovered results are consistent with the theoretical quantization errors. Now, we give an analysis on the probability of whether a quantization range can catch up the previous difference. For example, for the case using Scheme C, there are four clusters. On average, we may have four ( μ 0 , μ 1 , μ 2 , μ 3 ) = ( 51 , 102 , 153 , 204 ) , and the first value μ 0 and the differences ( δ 1 , δ 2 , δ 3 ) are no larger than 51.
The quantization ranges of Scheme C R 0 : 0 252 , R 1 : 0 126 , R 2 : 0 63 , and R 3 : 0 63 satisfy the requirement. For a ( δ 0 , δ 1 , δ 2 , δ 3 ) , the difference δ 1 is bounded with the value ( 255 s ) , where s = ( μ 0 + δ 2 + δ 3 ) = ( δ 0 + δ 1 + δ 2 ) . Because the quantization range R 1 : 0 126 is used for δ 1 , for an extreme case which s is very small, the value of ( 255 s ) may be larger than 126, out of range R 1 . This may give rise to large error of recovered value. As we know, k-means clustering algorithm is a good quantization algorithm. Therefore, for most data, we may recover the original ( μ 0 , μ 1 , μ 2 , μ 3 ) with small distortion. Experimental results in Table 1 also confirms the above statement.
(2) Size of Compressed Rates (CRs):
Here, we deal with the enhancement of three modified ABTC-EQ schemes such as Scheme A, Scheme B, and Scheme C. Except the Scheme C (using two bits to represent four clusters), the other two schemes enhance the CR. As we know about compression technology, the CR is the most important key property. Better CR implies that compression technology has a better performance. Therefore, we showed a theoretical analysis of the estimated CRs in Theorems 1, 2, and 3. In addition, to prove the accuracy for theorem, we show a comparison of the simulation results (Table 2) and the estimated CRs derived by the Theorems. That is when k is {4,6,8} for all values of the given P e , the expected compression ratio of the proposed method is shown in Table 2.
Moreover, the average of CRs for five test images (Lena, Butterfly, Cameraman, Lake, Pepper) are listed. Consider the CRs using Scheme A. For the case k = 4 , the average CR of experimental values is 3.23 near the theoretical CR = 3.24 ( p e = 0.35 ). The average CR of experimental values is 4.27 (respectively, 4.78) for k = 6 (respectively, k = 8 ), which is near the theoretical CR = 4.27 ( p e = 0.45 ) (respectively, CR = 4.78 ( p e = 0.50)). This result consists with the increment of p e for a large k. As we know, if the edge values e i , 1 i k 2 , in E is “1” and not all the edge values are “1”, then the image block is defined as an edge block. The number of edge blocks is increased when the value of k is increased, and thus the probability is increase for the large k.
(3) Time Complexity:
The time complexity of all the proposed methods is an important criterion for the performance evaluation of compression algorithms. The suggested method fits this criterion very well. Because the only difference between Scheme A and the original ABTC-EQ is that Scheme A adopts Huffman code for representing three clusters, namely using (0), (10), and (11). This is a very simple Huffman code. In fact, we do not need encoding/decoding for this Huffman code in Scheme A. From another viewpoint, the original ABTC-EQ uses (00), (01), and (10) for representing three clusters, while Scheme A uses (0), (10), and (11) instead. The Huffman code in Scheme A is only used to represent the index of clusters c 0 , c 1 , and c 2 , and we do not need encoding/decoding of Huffman code. At this time, the (0), (10), and (11) are to only assure the unique representation of the index of the cluster.
Scheme B uses the same approach as Scheme A, represent clusters using Huffman code, and this approach combines various quantization ranges. Quantized pixels are used as representative pixels (8 bits) of each block when the image is decompressed. We use Scheme B-I as an example for describing the quantization representation is the same as a binary representation.
For a pixel with 8 bits ( b 8 , b 7 , , b 1 ) , its pixel value is i = 1 8 ( b i × 2 i 1 ) . For Scheme B-I, the value in R 0 is i = 1 7 ( b i × 2 i ) , while the values in R 1 and R 2 are i = 1 7 ( b i × 2 i 1 ) (note: R 0 , R 1 and R 2 use the following quantization ranges: R 0 : ( r 7 , r 6 , , r 1 ) = ( 128 64 32 16 8 4 2 ) , R 1 : ( r 7 , r 6 , , r 1 ) = ( 64 32 16 8 4 2 1 ) , R 2 : ( r 7 , r 6 , , r 1 ) = ( 64 32 16 8 4 2 1 ) . From the above description, Scheme A and Scheme B have almost the same execution time as the original ABTC-EQ. However, for Scheme C, we use four clusters. Thus, we need to use k-means clustering algorithm to subdivide a ( k × k ) -pixel block into four clusters. Running a fixed number t of iterations of the standard algorithm takes O ( t × c × k 2 ) for k 2 pixels in a block, where c is the number of clusters.
The original ABTC-EQ and Scheme C use c = 3 and 4, respectively. The proposed Scheme C uses four clusters and the quantization ranges in Equation (14). As described above the quantization approach has almost the same execution time as the original ABTC-EQ, but subdividing more clusters in every block for Scheme C is slightly greater than ABTC-EQ (note: time complexity order of clustering is O ( t × c × k 2 ) .
(4) Appropriate Way Using Our Schemes:
Our goal is for consumers to understand and appropriately use application scenarios for the three proposed ABTC-EQ schemes. To clearly describe their respective application scenarios, we create a radar chart to illustrate the multiple performances (the number of clusters, the PSNR of a recovered image, and the size of compressed file) and the variations among all the schemes (Scheme A, Scheme B-I∼IV, and Scheme C). The values of PSNR and CR are adopted from Table 1 using the test image Lena and the block size 4 × 4 pixels. From Figure 3, we conclude the following results showing how to appropriately use Scheme A, Scheme B-I∼B-IV, and Scheme C to develop their specialties according to applications. Because Scheme A has the same PSNR as ABTC-EQ, if we want to obtain a good PSNR along with a good CR, we should choose Scheme A. On the other hand, Scheme C has a very high PSNR. Therefore, if we want to have a significant improvement in PSNR, we may choose Scheme C, which still has the same CR as ABTC-EQ. For the application that a high CR is a requirement, we may use Scheme B to trade off the PSNR for the CR.

5. Conclusions

In this paper, we propose a method to improve the compression performance of ABTC-EQ, a method that overcomes the edge loss problem of the existing BTC-like image. It is very reasonable that the tri-clustering approach is preferable to the bi-clustering approach for the quality of the image. On the other hand, the problem of introducing the tri-clustering approach is that the file size increases. In this paper, by introducing variable-length coding, we found a method that satisfies both the image compression and image quality. In addition, we have mentioned in detail in the paper a sufficient theoretical analysis of the proposed method. When compared with ABTC-EQ, Scheme A enhances CR and does not change the PSNR, while Scheme C enhances PSNR without reducing CR. Scheme B trades off PSNR for CR. From these properties, we demonstrate how to properly use these schemes for intended applications. Moreover, experimental results are given to illustrate the effectiveness and advantages of the proposed schemes.

Author Contributions

Conceptualization, C.-N.Y.; writing—original draft preparation, C.-N.Y.; Writing—review & editing, C.K.; Validation, C.-N.Y., Y.-C.C., and C.K.; formal analysis, C.-N.Y.; methodology, C.-N.Y., Y.-C.C., T.-K.C., and C.K.; data curation, T.-K.C.; funding acquisition, C.-N.Y., C.K. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partially supported by Ministry of Science and Technology (MOST), under Grant 108-2221-E-259-009-MY2 and 109-2221-E-259-010, and by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by (2015R1D1A1A01059253), and was supported under the framework of international cooperation program managed by NRF (2016K2A9A2A05005255).

Acknowledgments

Thank you to the reviewers who reviewed this paper and the MDPI editor who edited it professionally.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Delp, E.; Mitchell, O. Mitchell: Image compression using block truncation coding. IEEE Trans. Commun. 1979, 27, 1335–1342. [Google Scholar] [CrossRef]
  2. Lema, M.; Mitchell, O. Absolute moment block truncation coding and its application to color images. IEEE Trans. Commun. 1984, 32, 1148–1157. [Google Scholar] [CrossRef]
  3. Mathews, J.; Nair, M.S.; Jo, J. Modified BTC algorithm for gray scale images using max-min quantizer. In Proceedings of the International Multi Conference on Automation, Computing, Control, Communication and Compressed Sensing—iMac4s, Kottayam, India, 22–23 March 2013; IEEE Computer Society Press: Los Alamitos, CA, USA, 2013; pp. 377–382. [Google Scholar]
  4. Mathews, J.; Nair, M.S. Adaptive block truncation coding technique using edge-based quantization approach. Comput. Electr. Eng. 2015, 43, 169–179. [Google Scholar] [CrossRef]
  5. Chang, C.C.; Lin, C.Y.; Fan, Y.H. Lossless data hiding for color images based on block truncation coding. Pattern Recognit. 2008, 41, 2347–2357. [Google Scholar] [CrossRef]
  6. Lin, C.; Liu, X. A reversible data hiding scheme for block truncation compressions based on histogram modification. In Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, Kitakushu, Japan, 25–28 August 2012; pp. 157–160. [Google Scholar]
  7. Chang, I.C.; Hu, Y.C.; Chen, W.L. High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding. Signal Process. 2015, 108, 376–388. [Google Scholar] [CrossRef]
  8. Zhang, S.; Gao, T.; Yang, T.L. Reversible data hiding scheme based on histogram modification in integer DWT domain for BTC compressed images. Int. J. Netw. Secur. 2016, 18, 718–727. [Google Scholar]
  9. Bai, J.; Chang, C.C. A high payload steganographic scheme for compressed images with Hamming codeg. Int. J. Netw. Secur. 2016, 18, 1122–1129. [Google Scholar]
  10. Kim, C.; Shin, D.; Yang, C.N. Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC. Pers. Ubiquitous Comput. 2018, 22, 11–22. [Google Scholar] [CrossRef]
  11. Kim, C.; Shin, D.; Yang, C.N. A (2, 2) secret sharing scheme based on Hamming code and AMBTC. In Proceedings of the Asian Conference on Intelligent Information and Database Systems (ACIIDS 2012), Kaohsiung, Taiwan, 19–21 March 2012; Volume 7197, pp. 129–139. [Google Scholar]
  12. Kim, C.; Shin, D.; Shin, D.; Tso, R.; Yang, C.N. A secret sharing scheme for EBTC using steganography. J. Intell. Manuf. 2014, 25, 241–249. [Google Scholar] [CrossRef]
  13. Ou, D.; Ye, L.; Sun, W. User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion. J. Vis. Commun. Image Represent. 2015, 29, 246–260. [Google Scholar] [CrossRef]
  14. Yang, C.N.; Wu, X.; Chou, Y.C.; Fu, Z. Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options. J. Vis. Commun. Image Represent. 2017, 48, 182–194. [Google Scholar] [CrossRef]
  15. Canny, J. A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell. 1986, 6, 182–194. [Google Scholar] [CrossRef]
  16. Kanungo, T.; Mount, D.M.; Netanyahu, N.S.; Piatko, C.D.; Silverman, R.; Wu, A.Y. An efficient k-means clustering algorithm: Analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell. 2002, 24, 881–892. [Google Scholar] [CrossRef]
Figure 1. The reconstructed images for Lena: (a) original image (b) absolute moment BTC (AMBTC): 33.42 dB (c) modified BTC (MBTC): 33.87 dB (d) adaptive block truncation coding based on edge quantization (ABTC-EQ): 37.49 dB (e) Scheme A: 37.49 dB (f) Scheme B-I: 37.47 dB (g) Scheme B-II: 37.39 dB (h) Scheme B-III: 37.14 dB (i) Scheme B-IV: 35.96 dB (j) Scheme C: 39.62 dB.
Figure 1. The reconstructed images for Lena: (a) original image (b) absolute moment BTC (AMBTC): 33.42 dB (c) modified BTC (MBTC): 33.87 dB (d) adaptive block truncation coding based on edge quantization (ABTC-EQ): 37.49 dB (e) Scheme A: 37.49 dB (f) Scheme B-I: 37.47 dB (g) Scheme B-II: 37.39 dB (h) Scheme B-III: 37.14 dB (i) Scheme B-IV: 35.96 dB (j) Scheme C: 39.62 dB.
Applsci 10 07340 g001
Figure 2. Selected portion of edge image for Cameraman: (a) original image (b) AMBTC (c) MBTC (d) ABTC-EQ (e) Scheme C.
Figure 2. Selected portion of edge image for Cameraman: (a) original image (b) AMBTC (c) MBTC (d) ABTC-EQ (e) Scheme C.
Applsci 10 07340 g002
Figure 3. Radar chart for the proposed schemes using the variables of the number of clusters, the PSNR of recovered image, and the CR.
Figure 3. Radar chart for the proposed schemes using the variables of the number of clusters, the PSNR of recovered image, and the CR.
Applsci 10 07340 g003
Table 1. Comparison of block truncation coding (BTC)-like Schemes on peak signal-to-noise ratio (PSNR), compression ratio (CR), structural similarity (SSIM) and feature similarity (FSIM).
Table 1. Comparison of block truncation coding (BTC)-like Schemes on peak signal-to-noise ratio (PSNR), compression ratio (CR), structural similarity (SSIM) and feature similarity (FSIM).
Tested
Image
MethodBlock Size ( 4 × 4 ) PixelsBlock Size ( 6 × 6 ) PixelsBlock Size ( 8 × 8 ) Pixels
PSNRCRSSIMFSIMPSNRCRSSIMFSIMPSNRCRSSIMFSIM
LenaAMBTC33.424.000.99010.994631.305.540.97530.981429.996.400.95870.9697
MBTC33.874.000.99010.994231.775.540.97630.980030.556.400.96140.9647
ABTC-EQ37.493.090.99440.997335.293.980.98850.991534.074.360.98260.9855
Scheme A37.493.240.99440.997335.294.290.98850.991534.074.800.98260.9855
Scheme B-I37.473.330.99450.997435.284.380.98860.991734.054.870.98270.9857
Scheme B-II37.393.420.99400.997035.214.470.98790.991134.004.940.98190.9849
Scheme B-III37.143.520.99280.996235.014.560.98620.989633.825.010.97990.9832
Scheme B-IV35.963.620.98690.991734.174.660.97870.984133.135.090.97170.9770
Scheme C39.623.090.99540.997937.403.980.99110.993936.264.360.98740.9907
ButterflyAMBTC32.264.000.98770.994430.275.540.97020.981829.096.400.95200.9687
MBTC32.664.000.98770.993930.745.540.97210.980629.616.400.95520.9644
ABTC-EQ36.262.990.99390.997134.203.780.98660.990833.044.090.97930.9845
Scheme A36.263.150.99390.997134.204.120.98660.990833.044.570.97930.9845
Scheme B-I36.243.250.99390.997134.184.210.98670.991033.024.640.97950.9847
Scheme B-II36.173.350.99350.996734.124.310.98610.990432.974.720.97860.9840
Scheme B-III35.963.460.99250.996133.964.420.98460.989132.814.800.97690.9823
Scheme B-IV34.993.580.98740.992233.244.530.97790.983532.194.890.96920.9759
Scheme C38.322.990.99510.997636.293.780.99010.993335.194.090.98520.9895
CameramanAMBTC32.134.000.99200.993429.825.540.97820.976228.676.400.96590.9609
MBTC32.434.000.99150.991430.245.540.97950.973929.136.400.96780.9559
ABTC-EQ36.733.120.99610.997134.334.070.99140.990933.124.560.98720.9844
Scheme A36.733.260.99610.997134.334.370.99140.990933.124.970.98720.9844
Scheme B-I36.713.350.99610.997234.314.450.99160.991133.115.030.98740.9848
Scheme B-II36.653.440.99570.996734.274.540.99100.990333.075.100.98670.9838
Scheme B-III36.433.530.99460.995734.134.620.98960.988832.955.160.98510.9820
Scheme B-IV35.303.630.98910.989233.424.720.98280.981232.415.230.97790.9737
Scheme C39.053.120.99680.997836.734.070.99390.994435.564.560.99130.9910
LakeAMBTC30.484.000.98690.991828.295.540.96740.974727.306.400.95190.9611
MBTC30.934.000.98660.990428.825.540.96980.971427.946.400.95570.9529
ABTC-EQ34.683.040.99280.995832.503.880.98530.988231.554.250.97960.9808
Scheme A34.683.190.99280.995832.504.210.98530.988231.554.710.97960.9808
Scheme B-I34.673.290.99280.995932.494.300.98540.988331.544.780.97980.9811
Scheme B-II34.623.390.99250.995632.464.400.98490.987731.504.860.97920.9804
Scheme B-III34.473.490.99190.994932.344.490.98390.986831.394.930.97780.9787
Scheme B-IV33.873.600.98870.992231.864.600.97900.982230.935.010.97150.9730
Scheme C36.713.040.99400.996634.743.880.98900.991933.814.250.98530.9877
PeppersAMBTC33.574.000.99080.995631.225.540.97720.982629.736.400.96190.9689
MBTC34.054.000.99040.994631.875.540.97770.980230.496.400.96290.9621
ABTC-EQ37.593.170.99390.997535.404.050.98780.991534.074.390.98180.9850
Scheme A37.593.310.99390.997535.404.350.98780.991534.074.830.98180.9850
Scheme B-I37.573.390.99390.997535.374.430.98790.991634.034.890.98190.9851
Scheme B-II37.503.470.99360.997235.304.520.98730.990933.984.960.98110.9843
Scheme B-III37.273.560.99260.996335.124.610.98590.989533.815.040.97930.9822
Scheme B-IV36.113.650.98730.991634.254.700.97860.983233.095.110.97100.9749
Scheme C39.263.170.99460.997737.064.050.98990.993235.774.390.98560.9891
Table 2. Estimated CRs of all proposed schemes with k = 4 , 6 and 8 for 0.05 p e 0.6 .
Table 2. Estimated CRs of all proposed schemes with k = 4 , 6 and 8 for 0.05 p e 0.6 .
P e Scheme AScheme B-IScheme B-IIScheme B-IIIScheme B-IVScheme C
(AMBTC-EQ)
k = 4k = 6k = 8k = 4k = 6k = 8k = 4k = 6k = 8k = 4k = 6k = 8k = 4k = 6k = 8k = 4k = 6k = 8
0.053.775.276.133.795.296.143.815.306.153.825.326.163.845.336.173.745.226.05
0.103.675.125.953.705.155.973.745.185.993.775.216.013.805.246.033.625.025.80
0.153.584.985.783.625.025.813.675.065.843.725.105.873.765.145.903.504.835.58
0.203.484.855.623.544.905.663.604.955.693.665.005.733.735.055.773.394.665.37
0.253.404.725.473.474.785.513.544.845.563.614.905.603.694.975.653.284.505.17
0.303.324.605.323.404.675.373.484.745.423.574.815.483.664.885.533.184.354.99
0.353.244.495.193.334.565.243.424.645.303.524.725.363.624.805.423.094.214.82
0.403.164.385.063.264.465.123.364.545.183.474.635.243.594.725.313.004.084.66
0.453.094.274.933.204.365.003.314.455.063.434.555.133.564.655.202.923.964.51
0.503.024.174.823.134.274.883.254.364.953.384.475.033.524.575.102.843.844.38
0.552.964.084.703.084.184.783.204.284.853.344.394.933.494.505.012.773.734.25
0.602.903.994.603.024.094.673.154.204.753.304.314.833.464.434.912.703.634.12
Avg. values3.234.274.783.324.354.843.414.454.923.514.544.993.624.645.073.083.954.33
Notes: “Avg. values” show averages experimental values as generating given algorithms such as Scheme A ... Scheme C.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yang, C.-N.; Chou, Y.-C.; Chang, T.-K.; Kim, C. An Enhanced Adaptive Block Truncation Coding with Edge Quantization Scheme. Appl. Sci. 2020, 10, 7340. https://doi.org/10.3390/app10207340

AMA Style

Yang C-N, Chou Y-C, Chang T-K, Kim C. An Enhanced Adaptive Block Truncation Coding with Edge Quantization Scheme. Applied Sciences. 2020; 10(20):7340. https://doi.org/10.3390/app10207340

Chicago/Turabian Style

Yang, Ching-Nung, Yung-Chien Chou, Tao-Ku Chang, and Cheonshik Kim. 2020. "An Enhanced Adaptive Block Truncation Coding with Edge Quantization Scheme" Applied Sciences 10, no. 20: 7340. https://doi.org/10.3390/app10207340

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop