Abstract
The electronic form of data is compressed practically using techniques to acquire information which are not redundant is called image compression. After compression, the image gains high visual quality with reduced bit rate compared to the raw image. In the Internet of Things (IoT) environment, efficient transmission and storage of images are required for security purposes. Block splitting (BS) and discrete cosine transform (DCT) is applied initially on the raw images to reduce the actual bit rate which minimizes the mean square value (MSE) and the noise in the near-constant region. In this paper, EQI-AC (Enhanced Quality Image After Compression) algorithm is used to enhance contrast, intensity and brightness of the compressed image, which is balanced, for visualization. Peak signal noise ratio (PSNR) values are calculated and found that 1/3rd of the psnr value is decreased comparing to the original image as displayed in TableĀ 1. Structure similarity index (SSIM) values are calculated and found that there is slight degrade from 0.01 to 0.1 range in the quality of the compressed image compared to the original image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chung, S.-W., Kim, B.-K., Song, W.-J.: Removing chromatic aberration by digital image processing. Opt. Eng. 49(6) (2010). https://doi.org/10.1117/1.3455506
Uhrina, M., Bienik, J., Mizdos, T.: Chroma subsampling influence on the perceived video quality for compressed sequences in high resolutions. Digit. Image Process. Comput. Graph. 15(4) (2017). https://doi.org/10.15598/aeee.v15i4.2414
Alam, L., Dhar, P.K., Hasan, M.A.R., Bhuyan, M.G.S., Daiyan, G.M.: An improved JPEG image compression algorithm by modifying luminance quantization table (2019)
Temmermans, F., Bruylants, T., Schelkens, P., Ebrahimi, T.: An introduction to JPEG standards for digitization and archiving applications (2009)
Barni, M., Nowroozi, E., Tondi, B.: Detection of adaptive histogram equalization robust against JPEG compression (2018). https://doi.org/10.1109/iwbf.2018.8401564
Chen, Z., Zhao, Y., Ni, R.: Detection for operation chain: histogram equalization and dither-like operation. KSII Trans. Internet Inf. Syst. 9(9), 3751ā3770 (2015). ISSN 1976-7277. https://doi.org/10.3837/tiis.2015.09.026
Cozzolino, D., Gragnaniello, D., Verdoliva, L.: Image forgery detection through residual-based local descriptors and block-matching. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 5297ā5301. IEEE (2014)
Pizer, S.M., Amburn, E.P., Austin, J.D., Cromartie, R., Geselowitz, A., Greer, T., ter Haar Romeny, B., Zimmerman, J.B., Zuiderveld, K.: Adaptive histogram equalization and its variations. Comput. Vis. Graph. Image Process. 39(3), 355ā368 (1987). ISSN 0734-189X. https://doi.org/10.1016/S0734-189X(87)80186-X
Cao, G., Zhao, Y., Ni, R.: Forensic estimation of gamma correction in digital images. In: 2010 17th IEEE International Conference on Image Processing (ICIP), pp. 2097ā2100. IEEE (2010)
Cao, G., Zhao, Y., Ni, R., Li, X.: Contrast enhancement-based forensics in digital images. IEEE Trans. Inf. Forensics Secur. 9(3), 515ā525 (2014)
Barni, M., Fontani, M., Tondi, B.: A universal technique to hide traces of histogram-based image manipulations. In: Proceedings of the on Multimedia and Security, pp. 97ā104. ACM (2012)
De Rosa, A., Fontani, M., Massai, M., Piva, A., Barni, M.: Second-order statistics analysis to cope with contrast enhancement counter-forensics. IEEE Sig. Process. Lett. 22(8), 1132ā1136 (2015)
Pan, X., Zhang, X., Lyu, S.: Exposing image forgery with blind noise estimation. In: Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security, pp. 15ā20. ACM (2011)
Li, H., Luo, W., Qiu, X., Huang, J.: Identification of various image operations using residual-based features. IEEE Trans. Circuits Syst. Video Technol. 28, 31ā45 (2016)
Singh, N., Gupta, A.: Analysis of contrast enhancement forensics in compressed and uncompressed images. In: 2016 International Conference on Signal Processing and Communication (ICSC), pp. 303ā307. IEEE (2016)
Barni, M., Nowroozi, E., Tondi, B.: Higher-order, adversary-aware, double jpeg-detection via selected training on attacked samples. In: 2017 25th European Signal Processing Conference (EUSIPCO), pp. 281ā285, August 2017
Bestagini, P., Allam, A., Milani, S., Tagliasacchi, M., Tubaro, S.: Video codec identification. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2257ā2260. IEEE (2012)
Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digitalimages. IEEE Trans. Inf. Forensics Secur. 7(3), 868ā882 (2012)
Verdoliva, L., Cozzolino, D., Poggi, G.: A feature-based approach for image tampering detection and localization. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 149ā154. IEEE (2014)
Goljan, M., Fridrich, J., Cogranne, R.: Rich model for steganalysis of color images. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 185ā190. IEEE (2014)
Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432ā444 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Durairaj, M., Hirudhaya Mary Asha, J. (2021). The Appraised Structure for Improving Quality in the Compressed Image Using EQI-AC Algorithm. In: Chen, J.IZ., Tavares, J.M.R.S., Shakya, S., Iliyasu, A.M. (eds) Image Processing and Capsule Networks. ICIPCN 2020. Advances in Intelligent Systems and Computing, vol 1200. Springer, Cham. https://doi.org/10.1007/978-3-030-51859-2_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-51859-2_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-51858-5
Online ISBN: 978-3-030-51859-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)