A REVIEW ON IMAGE COMPRESSION
DOI:
https://doi.org/10.65009/xneh2e87Keywords:
Image Compression, Arithmetic Coding, Run Length Encoding, MSE, PSNR,,Abstract
Storage, connection, and quicker computation are the three most important components that
the world of image processing requires at the moment. In order to facilitate the transfer of these three
features to programs that deal with image processing, picture compression is utilized. There is a large
variety of algorithms and methods that can be utilized for both lossless and lossy image compression.
This piece of work provides a comprehensive literature review of image compression techniques, which
includes an analysis of the underlying principles and approaches that are available, as well as the
requirements for further research. A model is proposed for the purpose of reinforcing ROI-based
compression approaches. This model is based on the dissociation of ROI and Non-ROI sections of the
image. Huffman Encoding is used to compress ROI, and Quad Tree Decomposition is used to compress
non-ROI components. Compression Ratio (CR), Mean Square Error (MSE), Peak Signal to Noise Ratio
(PSNR), and Bits Per Pixel are the evaluation metrics that are utilized in order to assess the effectiveness
of the image compression approaches that have been explored (BPP). According to the results of the
performance evaluation, the technique that was suggested functions better than other possible techniques.
References
Lucas, L.F.R., Rodrigues, N. M. M., Cruz, L.A.D, and de Faria, S.M.M., (2017) “Lossless
Compression of Medical Images Using 3-D Predictors”, IEEE Transactions on Medical Imaging ,
, Vol 36, Issue 11, pp. 2250-2260.
1. K Sankar, Divya Rohatgi, S Balakrishna Reddy, "COX Regressive Winsorized Correlated
Convolutional Deep Belief Boltzmann Network for Covid-19 Prediction with Big Data", Grenze
International Journal of Engineering & Technology (GIJET), Grenze ID: 01.GIJET.9.1.547, © Grenze
Scientific Society, 2023.
Narmatha, C.; Manimegalai, P.; Manimurugan, S., “A Lossless Compression Scheme for Grayscale
Medical Images Using a P2-Bit Short Technique”, Journal of Medical Imaging and Health
Informatics, 2017,Vol 7, Issue 6, pp. 1196-1204.
Haddas, S., Coatrieus, G., Cozic, M., and Bouslimi, S., Joint Watermarking and Lossless JPEG-LS
Compression for Medical Image Security.”, Innovation and Research in Biomedical engineering ,
, Vol 38, Issue 4, pp. 198-206.
3. RS Supriya Khaitan, Divya Rohatgi, Sana Nalband, Tejali Mhatre, Shweta Patil, "Enhancing Essay
Grading Efficiency and Consistency through Two-Layer LSTM Models and Attention Mechanisms",
Journal of Information Systems Engineering and Management 10 (2), 191-202.
4. Nandipati Sai Akash, Uppu Lokesh, Naveen Sai Bommina, Hussain Syed, Syed Umar, "Swarm
Intelligence-Based Hyperparameter Optimization for AI-Powered IoT Threat Detection",
International Journal of Intelligent Systems and Applications in Engineering, (2024), 12(17s), 941.
5. Uppu Lokesh, Naveen Sai Bommina, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,
"Designing Energy-Efficient and Secure IoT Architectures Using Evolutionary Optimization
Algorithms", International Journal of Applied Engineering & Technology, Vol. 4 No.2, September,
6. M. Mukhedkar, D. Rohatgi, V.A. Vuyyuru, K.V.S.S. Ramakrishna, Y.A. Baker El-Ebiary, V.A.
Asir Daniel, "Feline wolf net: A hybrid lion-grey wolf optimization deep learning model for ovarian
cancer detection", Int. J. Adv. Comput. Sci. Appl., 14 (9) (2023)
Kavitha, P., “A survey on lossless and lossy data compression methods”, International Journal of
Computer Science & Engineering Technology, 2016,7(03), pp.110-114.
Nemati, K. and Ramakrishnan, K.,” Hybrid lossless and lossy compression technique for ECG
signals, Third International Conference on Sensing, Signal Processing and Security (ICSSS) ,May
,pp. 450-455. IEEE.
1.Naveen Sai Bommina, Uppu Lokesh, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,
"Optimizing AI-Driven Security Protocols in IoT Networks Using Metaheuristic Algorithms",
International Journal of Intelligent Systems and Applications in Engineering, IJISAE, 2024, 12(23s),
–3347.
2. Naveen Sai Bommina, Nandipati Sai Akash, Uppu Lokesh, Dr. Hussain Syed, Dr. Syed Umar, "A
Hybrid Optimization Framework for Enhancing IoT Security via AI-based Anomaly Detection",
International Journal on Recent and Innovation Trends in Computing and Communication, ISSN:
-8169 Volume: 11 Issue: 3.
Nemati, K. and Ramakrishnan, K., “Hybrid lossless and lossy compression technique for ECG
signals”. International Conference on Sensing, Signal Processing and Security (ICSSS) May 2017,
pp. 450-455 . IEEE.
M. Zhang, X. Tong, Z. Wang, and P. Chen, “Joint Lossless Image Compression and Encryption
Scheme Based on CALIC and Hyperchaotic System,” Entropy, 2021 ,vol. 23, no. 8, p. 1096, doi:
3390/e23081096.
Y. Zhang, J. Jiang, and G. Zhang, “Compression of remotely sensed astronomical image using
wavelet-based compressed sensing in deep space exploration,” Remote Sens.,2021, vol. 13, no. 2, pp.
–16, 2021, doi: 10.3390/rs130202884/AJRCOS/2021/v9i130213.
R. Mustafa, B. Ahmedi, and K. Mustafa, “Compression of Monochromatic and Multicolored Image
with Neural Network” ,2021 , vol. 9, no. 1, pp. 39–45, doi: 10.973.
A. Jeromel and B. Zalik, An efficient lossy cartoon image compression method, Multimed . Tools
Appl., 2020, vol. 79, pp. 433–451, Available: https://doi.org/10.1007/s11042-019-08126-7
D. Ariatmanto and F. Ernawan, Adaptive scaling factors based on the impact of selected DCT
coefficients for image watermarking J. King Saud Univ. - Comput. Inf. Sci., no. xxxx, 2020, doi:
1016/j.jksuci.2020.02.005.
7. Nandipati Sai Akash, Naveen Sai Bommina, Uppu Lokesh, Hussain Syed, Syed Umar, "Optimized
Block Chain-Enabled Security Mechanism for IoT Using Ant Colony Optimization", International
Journal on Recent and Innovation Trends in Computing and Communication, (2023), 11(10), 1226
Habeeb, M. S., & Babu, T. R. (2022). Network intrusion detection system: a survey on artificial
intelligence‐based techniques. Expert Systems, 39(9), e13066.
X. Zhou, Y. Bai, and C. Wang , “Image Compression Based on Discrete Cosine Transform and
Multistage Image Compression Based on Discrete Cosine Transform and Multistage Vector
Quantization” , Int. J. Multimed. Ubiquitous Eng., July 2020, Vol.10 , pp. 347–356, doi:
14257/ijmue.2015.10.6.33.
Habeeb, M. S., & Babu, T. R. (2024). Coarse and fine feature selection for network intrusion detection
systems (IDS) in IoT networks. Transactions on Emerging Telecommunications Technologies, 35(4),
e4961.
8. Naveen Sai Bommina , Nandipati Sai Akash, Uppu Lokesh , Dr. Hussain Syed , Dr. Syed Umar,
"Privacy-Preserving Federated Learning for IoT Devices with Secure Model Optimization",
International Journal of Communication Networks and Information Security (IJCNIS), (2021), 13(2),
–405.
Ahmad, Z., Khan, A. S., Aqeel, S., Julaihi, A. A., Tarmizi, S., Annuar, N., & Habeeb, M. S. (2022,
May). S-ADS: spectrogram image-based anomaly detection system for IoT networks. In 2022 Applied
Informatics International Conference (AiIC) (pp. 105-110). IEEE.
8. R. Gnanakumaran, Divya Rohatgi, A K Sampath, Nidhi Nagar, D. Amuthaguka, Raj Kumar Gupta,
"Robust Extreme Learning Machine based Sentiment Analysis and Classification", 2023 5th
International Conference on Smart System

