Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 222-225.

• Pattern Recognition & Image Processing • Previous Articles     Next Articles

Image Compression Method Combining Canny Edge Detection and SPIHT

WANG Ya-ge, KANG Xiao-dong, GUO Jun, HONG Rui, LI Bo, ZHANG Xiu-fang   

  1. School of Medical Imaging,Tianjin Medical University,Tianjin 300203,China
  • Online:2019-06-14 Published:2019-07-02

Abstract: To solve the problem that the reconstructed images obtained by SPIHT algorithm will lose texture details this paper proposed an image compression algorithm combining Canny edge detection and SPIHT.First,Canny edge detection is performed for the image,the extracted edge map,and edge recomposition is obtained;Secondly,SPIHT algorithm is used to encode the image,the encoded code stream is enconded and decoded by using Huffma,anda reconstructed image is obtained after SPIHT algorithm decoding and wavelet inverse transformation.inally,the two reconstructed images are added to recover the original image.The results show that the PSNR value and information entropy of reconstructed images are improved at low bites per pixel,compared with SPIHT combined with Huffman encode algorithm,and the information amount of reconstructed images is increased.

Key words: Image compression, SPIHT, Canny edge detection, Information entropy

CLC Number: 

  • TP391.41
[1] 康晓东.影像信息学[M].北京:人民卫生出版社,2009:108-109.
[2] MALLAT S G.A theory for multi-resolution signal decomposition:The wavelet representation [J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1989,11(7):674-693.
[3] SHAPIRO J M.Embedded image coding using zerotree of wavelet coefficient [J].IEEE Transactions on Signal Procession,1993,41(12):3445-3462.
[4] SAID A,PEARLMAN W A.A New,Fast,and Efficient Image Code Based on Set Partitioning in Hierarchical Trees[J].IEEE Transactions on Circuits and Systems for Video Technology,1996,6(3):243-250.
[5] CHEN H X,LIU Z G.Embedded and scale image coding based on virtual SPIHT[C]∥Nation Conference on Advanced Communication Technology.2011:764-767.
[6] ZHANG X J,HUANG W Y,LIU X.Improved listless zerotree coding image coding hardware algorithm based on lifting wavelet [J].Journal of Southwest Jiaotong University,2013,40(4):492-500.
[7] 黄庆.无链表SPIHT图像压缩编码改进算法研究[D].南昌:南昌大学,2013.
[8] 吴运泽.基于小波变换的多级树集合分裂图像压缩算法研究[D].沈阳:沈阳工业大学,2015.
[9] 汤敏,陈秀梅,陈峰.基于Contourlet变换和SPIHT算法的彩色医学图像压缩[J].计算机科学,2014,41(1):303-306.
[10] 王学春,刘申晓,常朝稳.基于混合域的改进SPIHT图像编码算法[J].计算机科学,2015,42(4):302-305.
[11] 王文豪,姜明新,赵文东.基于Canny算子改进的边缘检测算法[J].中国科技论文,2017,12(8):910-915.
[12] 王敏杰.图像边缘检测技术综述[C]∥2011年中国智能自动化学术会议论文集(第一分册).中国自动化学会智能自动化专业委员会,2011:6.
[13] CANNY J.A computational approach to edge detection. IEEE Transactions on Pattern Analysis and Machine Intelligence,1986,8(6):679-698.
[14] YANG S H,CHENG P F.Robust transmission of SPIHT-coded images over packet networks [J].IEEE Transactions on Circuits and Systems for Video Technology,2007,17(5):558-562.
[15] 张倩妮.基于SPIHT方法的医学图像压缩算法研究[D].武汉:武汉轻工大学,2016.
[1] ZHAO Qin-yan, LI Zong-min, LIU Yu-jie, LI Hua. Cascaded Siamese Network Visual Tracking Based on Information Entropy [J]. Computer Science, 2020, 47(9): 157-162.
[2] LIU Zi-qi, GUO Bing-hui, CHENG Zhen, YANG Xiao-bo and YIN Zi-qiao. Science and Technology Strategy Evaluation Based on Entropy Fuzzy AHP [J]. Computer Science, 2020, 47(6A): 1-5.
[3] ZHANG Jing-jing, ZHANG Ai-hua, JI Hai-feng. Image Compression Encoding Based on Wavelet Transform and Fractal [J]. Computer Science, 2019, 46(8): 310-314.
[4] ZHANG Fang, ZHAO Shu-liang, WU Yong-liang. Data Scaling Method for Multi-scale Data Mining [J]. Computer Science, 2019, 46(4): 57-65.
[5] ZHU Pei-pei, LONG Min. Recommendation Methods Considering User Indirect Trust and Gaussian Filling [J]. Computer Science, 2019, 46(11A): 178-184.
[6] ZHENG Shu-fu,YU Gao-feng. Attribute Transfer and Knowledge Discovery Based on Formal Context [J]. Computer Science, 2018, 45(6A): 117-119.
[7] ZOU Na, TIAN Jin-wen. Research on Multi Feature Fusion Infrared Ship Wake Detection [J]. Computer Science, 2018, 45(11A): 172-175.
[8] WANG Feng, LIU Ji-chao, WEI Wei. Semi-supervised Feature Selection Algorithm Based on Information Entropy [J]. Computer Science, 2018, 45(11A): 427-430.
[9] YUAN Xiao-yan, WANG An-zhi, PAN Gang and WANG Ming-hui. Visual Attention Modeling Based on Multi-scale Fusion of Amplitude Spectrum and Phase Spectrum [J]. Computer Science, 2017, 44(7): 293-298.
[10] FENG Fei, LIU Pei-xue, LI Xiao-yan and YAN Nan-bin. Research of Discrete Cosine Transform for Image Compression Algorithm [J]. Computer Science, 2016, 43(Z11): 240-241.
[11] WANG Hai-yan, YIN Jun and PAN Xian-meng. Video Compression Based on Surfacelet Transform and SPIHT Algorithm [J]. Computer Science, 2016, 43(Z11): 237-239.
[12] LU Gang, XIAO Bin and WANG Guo-yin. Image Compression Based on Discrete Tchebichef Moments and Soft Decision Quantization [J]. Computer Science, 2016, 43(11): 304-308.
[13] XIAO Bin, LU Gang, WANG Guo-yin and MA Jian-feng. Image Compression Based on Discrete Hermite Polynomials [J]. Computer Science, 2015, 42(Z11): 140-141.
[14] ZHANG Heng-wei, HAN Ji-hong, WEI Bo and WANG Jin-dong. Research on Cloud Resource Scheduling Method Based on Map-Reduce [J]. Computer Science, 2015, 42(8): 118-123.
[15] WANG Feng WEI Wei. Group Feature Selection Algorithm for Data Sets with Missing Data [J]. Computer Science, 2015, 42(7): 285-290.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .