scholarly journals Enhanced Binary MQ Arithmetic Coder with Look-Up Table

Information ◽  
2021 ◽  
Vol 12 (4) ◽  
pp. 143
Author(s):  
Hyung-Hwa Ko

Binary MQ arithmetic coding is widely used as a basic entropy coder in multimedia coding system. MQ coder esteems high in compression efficiency to be used in JBIG2 and JPEG2000. The importance of arithmetic coding is increasing after it is adopted as a unique entropy coder in HEVC standard. In the binary MQ coder, arithmetic approximation without multiplication is used in the process of recursive subdivision of range interval. Because of the MPS/LPS exchange activity that happens in the MQ coder, the output byte tends to increase. This paper proposes an enhanced binary MQ arithmetic coder to make use of look-up table (LUT) for (A × Qe) using quantization skill to improve the coding efficiency. Multi-level quantization using 2-level, 4-level and 8-level look-up tables is proposed in this paper. Experimental results applying to binary documents show about 3% improvement for basic context-free binary arithmetic coding. In the case of JBIG2 bi-level image compression standard, compression efficiency improved about 0.9%. In addition, in the case of lossless JPEG2000 compression, compressed byte decreases 1.5% using 8-level LUT. For the lossy JPEG2000 coding, this figure is a little lower, about 0.3% improvement of PSNR at the same rate.

Author(s):  
Wei Li ◽  
Peng Ren

The entropy coding of context-adaptive binary arithmetic coding (CABAC) has been utilized in the H.265/HEVC for higher coding efficiency. But the related complexity also causes a bottleneck for its low-delay applications, owing to the employment of inter-symbol dependency in CABAC. In this paper, a fast bit-rate estimation method is proposed to skip the actual entropy coding of CABAC in mode decision to meet the requirement of low-delay implementations. The presented scheme firstly parses the characteristics of syntax elements and then guided by the principle of CABAC, an efficient scheme is derived following. It is very beneficial for reducing the computational complexity and saving the encoding time in H.265/HEVC mode decision. Experimental results demonstrate that the proposed fast algorithm can reduce the CABAC encoding time by 68% in average with negligible degradation in the rate-distortion performance.


2017 ◽  
Vol 13 (10) ◽  
pp. 6552-6557
Author(s):  
E.Wiselin Kiruba ◽  
Ramar K.

Amalgamation of compression and security is indispensable in the field of multimedia applications. A novel approach to enhance security with compression is discussed in this  research paper. In secure arithmetic coder (SAC), security is provided by input and output permutation methods and compression is done by interval splitting arithmetic coding. Permutation in SAC is susceptible to attacks. Encryption issues associated with SAC is dealt in this research method. The aim of this proposed method is to encrypt the data first by Table Substitution Box (T-box) and then to compress by Interval Splitting Arithmetic Coder (ISAC). This method incorporates dynamic T-box in order to provide better security. T-box is a method, constituting elements based on the random output of Pseudo Random Generator (PRNG), which gets the input from Secure Hash Algorithm-256 (SHA-256) message digest. The current scheme is created, based on the key, which is known to the encoder and decoder. Further, T-boxes are created by using the previous message digest as a key.  Existing interval splitting arithmetic coding of SAC is applied for compression of text data. Interval splitting finds a relative position to split the intervals and this in turn brings out compression. The result divulges that permutation replaced by T-box method provides enhanced security than SAC. Data is not revealed when permutation is replaced by T-box method. Security exploration reveals that the data remains secure to cipher text attacks, known plain text attacks and chosen plain text attacks. This approach results in increased security to Interval ISAC. Additionally the compression ratio  is compared by transferring the outcome of T-box  to traditional  arithmetic coding. The comparison proved that there is a minor reduction in compression ratio in ISAC than arithmetic coding. However the security provided by ISAC overcomes the issues of compression ratio in  arithmetic coding. 


1988 ◽  
Vol 32 (6) ◽  
pp. 717-726 ◽  
Author(s):  
W. B. Pennebaker ◽  
J. L. Mitchell ◽  
G. G. Langdon ◽  
R. B. Arps

2018 ◽  
Vol 7 (2.20) ◽  
pp. 93 ◽  
Author(s):  
K Lakshmi Narayanan ◽  
G P. Ramesh ◽  
V Divya

In this paper the system is mainly designed for the  military purpose security since now-a-days securing our military has become a difficult task .our live is mainly dependent on other objects mainly we are computer based living and digital image processing plays a vital role in it. This process has much advantage as well as some disadvantage. A VLSI circuit is built with many millions of IC chip, so it is considered to be indivisible for the construction purpose. The internet-of things (Iot) is a electronic device which is connected to the vehicle and the building item which is used to generate many secured techniques which is connected with the software, electrical, electronics and mechectronics devices and human recourses also. Better Portable Graphics Algorithm with a Context-Adaptive Binary Arithmetic Coding (CABAC) encoding algorithm is used in the existing system this process is affected by the Gaussian noise, low compression ratio and time delay to overcome above issues and  enhanced with Secure Better Portable Graphics (SBPG) compression algorithm with HEVC is present .The proposed architecture is suitable for high performance imaging in the Iot and for the high quality compression files and secured transformation of image and video captured in the digital camera. Encryption and watermarking are the two technique used in the process. The watermarking technique is more secure than the previous system. This process produces high quality JPEG, and high PSNR ratio. The scrambling algorithm is used in the encryption process. It is used for providing secured image.


Sign in / Sign up

Export Citation Format

Share Document