17
International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977 © Research India Publications, http://www.ripublication.com Optimized Wavelet Filters and Modified Huffman Encoding-based Compression and Chaotic Encryption for Image Data Renjith V Ravi and Kamalraj Subramaniam Department of Electronics and Communication Engineering, Faculty of Engineering, Karpagam Academy of Higher Education, Karpagam University, Coimbatore, India. ORCID : 0000-0001-9047-3220; ORCID : 0000-0002-6781-4282 Abstract: For the transmission of images through wireless communication channels effectively, the two major con- cerns to be addressed are the bandwidth limitation and the high probability of error. To overcome the bandwidth issue, compression is applied to the transmitted data. How- ever, compression increases bit dependency, which, in turn, introduces error extension effects. In this paper, a new two-level compression model is proposed namely, SPIHT- MHE algorithm. This model improves the compression performance of the original input data. Additionally, opti- mized discrete wavelet transform (DWT) is derived using hybridization of genetic and gravitational search algorithm to improve the wavelet performance. The proposed system of image compression and encryption system (ICES) con- sists of two modules:compression-Encryption module and decompression-decryption . In the first phase, the input image is transformed using hybrid GSA-GA algorithm-based DWT. In the second phase, the input image is firstly compressed using SPIHT and subsequently, a second-level compression scheme is proposed using merging-based Huffman encod- ing (MHE) algorithm. In the third phase, the compressed is, encrypted to have the secure transmission/storage. The per- formance of the proposed compression system is evaluated by PSNR, MSE,SSIM, compression ratio, and compression rate. Further the chaotic encryption algorithm has been eval- uated using suitable metrics, Experimental results show that the proposed system provides a greater compressing capacity and maintains the received image at a higher quality. Keywords: image compression,optimized DWT, MHE, Hybrid GSA-GA, Gravitational Search Algorithm INTRODUCTION As of late, with the hasty development in transmitting images over public networks, the network bandwidth and security have gotten significant measures of consideration. The most effective method to compress images to spare bandwidth and encrypt images to ensure privacy has got to be the hotspot on which the researchers would investigate. Extremely compelling and well known approaches to accomplish compression of image data depends on the dis- crete cosine transform (DCT) and discrete wavelet transform (DWT). DCT gives a great energy compaction, and various fast algorithms exist for computing the DCT. Recently, an awesome part of the research practices in image coding have been based on the DWT, which has turned into a standard tool in image compression applications on account of its various advantages [1] over DCT. The most well-known dis- tortion in DWT based image compression framework is the quantization error [2]. In spite of the fact that quantization greatly enhances compression ratios; perfect reconstruction is unimaginable because of the loss of low-order bits [3]. So the performance of an image coder depends on the minimiza- tion of this loss at the desired compression ratio. This is solely depends on the properties of filter banks used in DWT, used in it. So, the introduction of optimized filter banks derived from metaheuristic optimization algorithms will further increase its performance [4],[5] in quality of reconstructed images. An image compression system includes an encoder like SPIHT or Huffman that uses the redundancies to describe the image data in a compressed way, while the decoder is exploited to renovate the original image from the compressed data [6]. In

OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

Optimized Wavelet Filters and Modified Huffman Encoding-basedCompression and Chaotic Encryption for Image Data

Renjith V Ravi and Kamalraj SubramaniamDepartment of Electronics and Communication Engineering, Faculty of Engineering,

Karpagam Academy of Higher Education,Karpagam University, Coimbatore, India.

ORCID : 0000-0001-9047-3220; ORCID : 0000-0002-6781-4282

Abstract: For the transmission of images through wirelesscommunication channels effectively, the two major con-cerns to be addressed are the bandwidth limitation andthe high probability of error. To overcome the bandwidthissue, compression is applied to the transmitted data. How-ever, compression increases bit dependency, which, in turn,introduces error extension effects. In this paper, a newtwo-level compression model is proposed namely, SPIHT-MHE algorithm. This model improves the compressionperformance of the original input data. Additionally, opti-mized discrete wavelet transform (DWT) is derived usinghybridization of genetic and gravitational search algorithmto improve the wavelet performance. The proposed systemof image compression and encryption system (ICES) con-sists of two modules:compression-Encryption module anddecompression-decryption . In the first phase, the input imageis transformed using hybrid GSA-GA algorithm-based DWT.In the second phase, the input image is firstly compressedusing SPIHT and subsequently, a second-level compressionscheme is proposed using merging-based Huffman encod-ing (MHE) algorithm. In the third phase, the compressed is,encrypted to have the secure transmission/storage. The per-formance of the proposed compression system is evaluatedby PSNR, MSE,SSIM, compression ratio, and compressionrate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show thatthe proposed system provides a greater compressing capacityand maintains the received image at a higher quality.

Keywords: image compression,optimized DWT, MHE,Hybrid GSA-GA, Gravitational Search Algorithm

INTRODUCTION

As of late, with the hasty development in transmitting imagesover public networks, the network bandwidth and securityhave gotten significant measures of consideration. The mosteffective method to compress images to spare bandwidth andencrypt images to ensure privacy has got to be the hotspot onwhich the researchers would investigate.

Extremely compelling and well known approaches toaccomplish compression of image data depends on the dis-crete cosine transform (DCT) and discrete wavelet transform(DWT). DCT gives a great energy compaction, and variousfast algorithms exist for computing the DCT. Recently, anawesome part of the research practices in image coding havebeen based on the DWT, which has turned into a standardtool in image compression applications on account of itsvarious advantages [1] over DCT. The most well-known dis-tortion in DWT based image compression framework is thequantization error [2]. In spite of the fact that quantizationgreatly enhances compression ratios; perfect reconstructionis unimaginable because of the loss of low-order bits [3]. Sothe performance of an image coder depends on the minimiza-tion of this loss at the desired compression ratio. This is solelydepends on the properties of filter banks used in DWT, used init. So, the introduction of optimized filter banks derived frommetaheuristic optimization algorithms will further increaseits performance [4],[5] in quality of reconstructed images. Animage compression system includes an encoder like SPIHTor Huffman that uses the redundancies to describe the imagedata in a compressed way, while the decoder is exploited torenovate the original image from the compressed data [6]. In

Page 2: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

Huffman Encoding, the frequency of occurrence of a specificpixel value is employed to encode the image pixel informationby means of variable size bit-words [7][8]. This procedure isknown as entropy encoding.

However alone compression is not adequate as it has noconfirmation on security of the information, which is to betransmitted. The Security of data to keep up its confidentiality,proper access control, integrity and accessibility are somesignificant issues in information communication. There aresome conventional encryption methodologies, such as DES,3DES,AES and RSA and so forth.An account of images havea lot of data, high redundancy and solid correlation of pixelfeatures etc. These customary algorithms are not appropriate[9], [10], [11] for practical encryption of image data.

Chaos theory [12] is a branch of mathematics,which hasapplicability in various sciences such as non linear dynam-ics, cryptology, communications etc. Since Robert A. 1.Matthews exhibited the idea of chaotic cipher in 1989, chaoticencryption strategy has pulled in more consideration. Chaoticsequences’s great properties like pseudo-randomness, ergod-icity and their highly sensitive dependence on starting con-ditions and other system parameters fit the prerequisites ofciphers.

A secure image codec having compression and encryp-tion modules has been developed in this paper. Initially ahybridization of Gravitational search Algorithm (GSA) andGenetic Algorithm (GA) were carried out to produce a noveloptimized wavelet filter bank which is to be used for trans-formation of images from spatial domain to wavelet domain.Subsequently, an SPIHT algorithm modified Huffman encod-ing known as merging based Huffman encoding (MHE) hasbeen developed to achieve the compression of images.

Further an image encryption algorithm using chaoticcipher has been developed for assuring the securityof compressed images. The proposed codec comprisestwo modules, namely compression-encryption module, anddecompression-decryption module. In the compression mod-ule, the input image is decomposed to high frequency and lowfrequency components using optimized wavelet filters andcompressed using SPIHT with MHE. And the compressedimage is encrypted using Chaos based encryption. In thedecompression and decryption module, the decryption, andde-compression were carried out to get the estimated image.

DESIGN OF OPTIMIZED WAVELETCOEFFICIENTS

Discrete Wavelet Transform

In recent times, DWT has risen as a mainstream system forcompression of data [13] because of its high de-correlationand energy compaction proficiency. An image that is decom-posed by DWT method can be reconstructed with the desiredresolution. The most important feature of DWT is that it per-mits multi-resolution decomposition. This is because of thefilter bank, which has both a low-pass filter (LPF) (H1) anda high-pass filter (HPF) (H0), enabling it to exactly halvethe frequency range between the two filers. This filter pair iscalled the analysis filter pair and the filter pair used for thereconstruction process is called the synthesis filter pair, whichconsists of another LPF (G1) and an HPF (G0). Fig. 1 showsthe filter bank approach of DWT.

FIGURE 1. Filter bank approach of DWT

Most importantly, the LPF is applied for each row of datato obtain low frequency components of the row.

As the LPF is a half-band filter, the output informationconsists of frequencies just in the first half of the originalfrequency range. By Shannon’s Sampling Theorem, thesefrequencies can be sub-sampled into two, so that the out-put information contains only half the original number ofsamples. Similarly, the HPF is connected to the same lineof information; once the high-pass components are sepa-rated, put them by the side of the low-pass components. Thisprocedure is repeated for all the rows of the image [14].

Next, the filtering is done on every column and subse-quently we get four bands of data, each marked as LL (low-low), HL (high-low), LH (low-high), and HH (high-high).This process is depicted in Fig. 2.

The LL band can be decomposed till the end, in the sameway further for creating more sub-bands [15]. This shouldbe possible up to any level, along these lines bringing abouta pyramidal decomposition as appeared over the LL band at

3962

Page 3: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

FIGURE 2. wavelet filter arrangement for Decomposition andreconstruction of an image

the highest level can be said as most imperative, and alter-nate bands are of lesser significance, the level of significanceabatements from the highest point of the pyramid to base. Forreconstructing the original image, the reverse of this processwould be done using the synthesis filter bank. Fig. 3 showsthe wavelet decomposition and reconstruction process.

FIGURE 3. Multi-level decomposition and reconstruction ofan image

Proposed Method for Optimization of Filter CoefficientsVia GSA-GA Hybridization

The high-pass and low-pass wavelet filter coefficients areoptimized using the hybrid GSA-GA optimization algo-rithm, which is basically the hybridization of GravitationalSearch (Algorithm 1) and Genetic (Algorithm 2) algorithms.

More clearly the hybrid GSA-GA is formed by incorporatingmutation and crossover operators into the GSA.

Randomized initialization The initial population israndomly generated with size X using the real coding rep-resentation. Each agent is encoded as a vector of floatingpoint numbers, with the same length as the vector of decisionvariables. Each agent contains two decision variables, one isthe Reconstruction filter (Rf) coefficients (b1 to bm) and theother is the decomposition filter (Df) coefficients (c1 to cm).

3963

Page 4: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

Based on the wavelet coefficients, the ith solution of agent Pi

is encoded as follows

Pi = {(b1, b2, . . . , bm)(c1, c2, . . . , cn)} m = 10 & n = 10(1)

Fitness evaluation of agents Here, the fitness functionused is peak signal to noise ratio between the input and outputimages and is computed as follows:

PSNR = 10 log10Maxi

2

MSE(2)

Where, Maxi is the maximum possible pixel value of theimage. When the pixels are represented using 8 bits per sam-ple, this is 255. A high value of PSNR means less errorbetween the images. So this problem is a maximizationproblem.

Initialization of agents considering a system with Nagents(masses)

Updating Velocity and Position During the searchprocess, the agents are moved according to the followingEqns:

Vi(t + 1) = randi × Vi(t) + ai(t) (3)

Pi(t + 1) = Pi(t) + Vi(t + 1) (4)

Where, Pi(t) and Vi(t) represent the current position andvelocity of agent at iteration, respectively.

Updating G Gravitational constant G is computed atiteration t

G(t) = G0 exp( −αtT

) (5)

G0 and α are initialized at the beginning and will be reducedwith time to control the search accuracy. T is the total numberof iterations.

Updating Masses: Gravitational and inertia masses foreach agent are calculated at iteration t .

Mai = Mpi = Mii = Mi ∀i = 1, 2, . . . , N

m(t) = f iti(t) − worst (t)

best (t) − worst (t)(6)

Mi(t) = mi(t)∑Ni=1 mj(t)

(7)

Where, Mai and Mpi are the active and passive gravitationalmasses, respectively, Mii is the inertia mass of the ith agent,

f iti(t) represents the fitness value of the agent i at time t ,and, worst (t) and best (t) are

best (t) = maxj∈{1,...N}f itj (t) (8)

worst (t) = minj∈{1,...N}f itj (t) (9)

Calculating the Total Force The force [16] acting onmass i from mass j at a specific time t is as follows:

Fdij (t) = G(t)

Mi(t) × Mj(t)

||Pi(t), Pj (t)|| (bdi (t) − bd

j (t)) (10)

Where Mi and Mj are masses of agents. The randomlyweighted sum of the forces exerted from other agents towardsthe ith agent is Fd

i (t) given as follows

Fdi (t) =

∑j �=i

randjFdij (t) (11)

Updating Acceleration The acceleration related tomass in the time.Its dimension is given as follows:

adi = Fd

i (t)

Mii(t)(12)

Where, Mii(t) is the inertial mass of ith agent at time t .

Crossover: In this step, uniform crossover is appliedon the agents to improve the solution quality. It is the mostlikely the most dominant crossover [17], [18], [19] because itallows the offspring chromosomes to search all possibilitiesof re-combining those different genes in parents. In uniformcrossover a cross over operator Cr determines the number ofgenes to be considered for crossover.

Mutation: In this step, uniform mutation process isapplied. The mutation operator performs a small agent orsolution modification by selecting the genes with the lengthof population and by interchanging the gene order. Muta-tion is carried out on the basis of pre-determined mutatingprobability.

Termination criteria: The stopping criterion isachieved when the objective function does not change fora certain number of generations or when the number ofgenerations exceeds the specified maximum generations.

The best chosen parameters of hybrid GSA-GA algorithmis shown in Table 1

After performing the crossover and mutation, the obtainedsolutions are compared with the earlier obtained solutions

3964

Page 5: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

Table 1. Parameters used in GSA-GA algorithm

Parameter ValuePopulation size 10Iteration Cycles 100α 0.01G0 0.1r Norm 2r Power 1Crossover Uniform CrossoverCrossover rate 0.5Mutation Uniform MutationMutation rate 0.5

from bat algorithm and the best solutions are selected. Thecomparison is made using the fitness function. Finally, afterall the iterations, the best solutions are found out, which givesthe optimized wavelet co-efficients, and making use of thesecoefficients, DWT is performed.The pseudo code of proposedGSA-GA algorithm is shown in algorithm 3.

DESIGN OF PROPOSED IMAGECOMPRESSION AND ENCRYPTION SYSTEM

The proposed image compression and encryption system(ICES) is depicted in Fig.4.In this, initially the input images

will be compressed using the optimized wavelet and twolevel encoding. The first level of two level encoding con-sists of Set Partitioning in Hierarchical Trees (SPIHT) [20]and modified form of basic Huffman encoding [21]. Further,this compressed image will be encrypted using chaos the-ory based image encryption algorithm. At the decompressionand decryption module, the coded image is decompressed anddecrypted.

FIGURE 4. Model of the proposed image compres-sion-encryption system

Optimized Wavelet and Two Level Encoding BasedCompression

In this module, the input images will compressed by transfor-mation using optimized DWT (discussed in section ) and twolevel encoding using SPIHT and modified Huffman encoding.

First-level Compression Via SPIHT Algorithm

Of late, the SPIHT [20] has surfaced as a dominant wavelet-based image compression technique. This technique encodesthe most vital wavelet transform coefficients and proceedsto communicate the bits in order that an incredibly refinedversion of the original image is gradually achieved. It glistens

3965

Page 6: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

with the sparkling merits of superb image quality, adapted forprogressive image communication, colourfully emerges witha completely entrenched coded file, and is advantageouslyemployed for loss less compression.

Once the wavelet transform is applied to an image, theinnovative SPIHT technique segments the decayed waveletinto major and minor partitions in accordance with thefunction shown below.

γp(C) ={

1, maxm,n∈C

{|qm,n|}

� 2p

0, otherwise(13)

Here, γp(C) represents the importance of a set of co-ordinatesC and qm,n relates to the coefficient value at coordinate (i, j).This technique is home to two passes: the sorting pass andthe refinement pass. It effectively exploits three lists knownas the LIP (List of Insignificant Pixels), LIS (List of Insignif-icant Sets), and LSP (List of Significant Pixels). The LIP,in essence, comprises the individual coefficients with lowermagnitudes than those of the thresholds. On the other hand,the LIS is a set of wavelet coefficients defined by tree struc-tures with lower magnitudes than those of the threshold.Further, the LSP represents a list of pixels having biggermagnitudes than those of the threshold.

The sorting pass is executed on the three lists mentionedabove. The greatest number of bits needed to characterize theprincipal co-efficient in the spatial orientation tree is achievedand symbolized by pmax as per the following relation:

Pmax = [log2(maxm,n{|qm,n|})] (14)

In the case of sorting pass, the corresponding coordinatesof the pixels which stay in the LIP are evaluated for impor-tance with the help of the equation shown above. The outcomeis forwarded to the output and from this the important one willbe sent to the LSP along with their sign bit output. The Setsin the LIS will also be evaluated for their importance and ifthey are found important, they are segregated and segmentedinto subsets.

The subsets having a single coefficient, which are estab-lished as important, are segregated and segmented into sub-sets. Further, the subsets having a solitary coefficient, whichare proved to be important, are included in the LSP; in othercases, they are placed in the LIP. In the refinement pass, thepth MSB of the coefficients in the LSP represents the ultimateoutput. The value of p is decreased step by step and the sortingand refinement passes are executed again. These passes arerepeated till the preferred rate is obtained or all the nodes inthe LSP contain all their bits output. The latter case is approx-imately precise renovation as all the coefficients have been

effectively subjected to the total processing. It is also possibleto efficiently manage the bit rate in the SPIHT technique inview of the fact that the output generated is in solitary bitsand the technique can be completed at any time.

Second-level Compression Via Merging-based HuffmanEncoding (MHE)

Merging-based Huffman encoding (MHE) algorithm consistsof three significant steps: (i) Huffman code creation of orig-inal data (ii) code conversion-based conditioning, and (iii)encoding. The sub section below explains the detailed processof MHE algorithm.

Huffman code creation of original data Initially thecreation of huffman code for the original data would be doneby the technique used in algorithm 4.

Code conversion of condition-based sequence Thecode conversion of condition-based sequence is done aftergenerating Huffman code for each symbol or original data(unsigned 8-bit integer value). The process of code conver-sion of condition-based sequence is as follows: initially theoriginal data and its codeword are taken. Thereafter, the codeconversion process is done by merging the two symbols, i.e.,

3966

Page 7: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

The number of times the selected combination of two sym-bols is repeated. Then, the merging process is based on thefollowing observations as below in Algorithm 5.

Encoding The encoding process is done based on thecombination of symbols used in the code conversion ofmerging-based sequence and the preceding symbol in theoriginal data. The encoding process is as follows: initiallythe combination of the symbols used for the code conversionprocess and the preceding symbol of the combination of thesymbols used for the code conversion process are checked todecide whether the code formed using the code conversionprocess is to be considered or not. Then the three conditionsexplained above are applied and checked if each symbol is inorder to encode the original data.After this verification, a codeis formed for the original data. The final code is the encodeddata based on merging-based Huffman encoding technique.

Example of the MHE algorithm: The complete pro-cess of MHE is explained by an example as follows: Let usassume ’(215) (145) (215) (145) (126) (215) (51) (45) (215)(126)’ is an original data and from this original data, the Huff-man code is formed for each symbol in the original data. Theformation of code is shown in Fig.5.

Fig. 5 is explained as follows: initially the repeated let-ters are considered once and the frequency of the letter ismarked in the original data, i.e., the numeric term 3 belowthe unsigned integer value ’215’ represents that the symbol

FIGURE 5. Formation of Huffman code

’215’ is repeated three times in the original data. Thereafter,two symbols with least frequency are taken and assigned zeroand one to them and then represent the total frequency of thetwo symbols below it. This process is repeated by taking thenext two symbols until the last step. The Huffman code isthen formed for each symbol by considering the correspond-ing branches of zeros and ones from the last step to the first.From Fig.5, the Huffman code formed for the symbol ’215’is 1; for the symbol ’145’ is 000; for the symbol ’126’ is01; for the symbol ’51’ is 0011; and the for the symbol ’45’is 0010. Eventually, the Huffman code for the original data’(215) (145) (215) (145) (126) (215) (51) (45) (215) (126)’is ’1000100001100110010101’. Fig.6 shows the direction ofHuffman code formed for each letter.

After generating the Huffman code for each letter, the codeconversion of condition-based sequence is done by arrangingthe least length letters first. The code conversion of merging-based sequence process is used to compress the data. InFig. 6, we obtained the frequency combination of two symbolsfirst and the merging process is applied only on the satisfiedcombination. Based on the merging conditions, at first, thecombination of symbols ’(215) (145)’ is repeated at least twotimes that only qualified for the merging process. Secondly,the pair that has the same combination of first digit of theselected pair ’(215) (145)’ that should not repeat. Thirdly, thebit length of the first position of pair (1) should be lesser than

3967

Page 8: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

FIGURE 6. Direction of Huffman code formation

the bit length of the second position of pair (000). Now, thepair ’(215) (145)’ is qualified for the merging process. Thenthe merging process is done by step 4 in the code conversionsection. The new code (215) (215) is replaced by ahead for(215) (145). Similarly, the code conversion process is donefor all the original data. Finally, the MHE-based encoded datafor the original data ’(215) (145) (215) (145) (126) (215) (51)(45) (215) (126)’ is ’111101100110010101’. Table 2 showsthe symbols with its code after the code conversion process.

Chaos-based Encryption

Subsequently, the compressed image is encrypted by employ-ing the Chaos method [22]. This method proceeds throughtwo phases of processing: (a) shuffle and (b) diffusion. Thepositions of the pixels were relocated in the shuffle stage andin the subsequent phase of diffusion, the values of pixels aredispersed, which are described as position and values mask,correspondingly.

The function of shuffle is to conceal the original organi-zation of the pixels of the image. Particularly, it reshapes theentire pixels of the image without causing any alteration intheir values. With this end in view, a chaotic diagram is effec-tively used as shown by the following relation known aArnoldcat map: [

xm+1

ym+1

]=

[1 c

d cd + 1

] [xm

ym

]mod W (15)

Where, c and d signify two positive integers and W standsfor the width or height of the image. An image encryptiontechnique only contains the shuffle operation and its securityis fragile and the cat diagram is an invertible discrete diagramwithout integrating the pixels’ values. That is, the map doescause any variation in the statistical traits of the plain-text likeintensity distribution of the pixels.The task called diffusion[23],[24] using Quadratic map [25] shown in Eq. 16 has beenentrusted to overwhelm this deficiency.

xm+1 = 1 − 2x2m (16)

Where, x0 ∈ [−1, 1] and m = 0, 1, 2, . . . etc.

As the output xm is in the range of (0, 1),we need to convertit into the range of (0, 256) using the Eq. 17 before diffusionprocess.

ki = (mi × 105) mod 256 (17)

The diffusion using this key stream ki is as shown below inEqn 18

Ei = Ii ⊕ ki (18)

Where Ii is the value of corresponding pixel in the shuffledimage and Ei is the value in encrypted image.

Decryption,De-compression and IDWT

For retrieving the original data, de-encryption, two levelde-compression, and finally taken Inverse Discrete WaveletTransform (IDWT) will carryout.

The de-encryption is the inverse operation of the Choas-based technique. In this, the original pixel value Ii is obtainedby the Eq.19, provided that the secret initial value Ei−1 isknown. s

Pi = Ei ⊕ ki (19)

The first-level decompression is done by MHE algorithm.The de-compression based on the SPIHT process follows theinverse steps of compression exactly and is almost symmet-rical in terms of processing time. After de-compression, theimage is inverse transformed to time domain using IDWT.The IDWT reconstructs a signal from the approximation anddetail coefficients derived from decomposition. The IDWTrequires up-sampling and filtering.

RESULTS AND DISCUSSION

The performance of the proposed system has been tested forvarious standard test images from [26] shown in Fig. 7.

3968

Page 9: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

Table 2. The symbols with its code after the code conversion process

Original 215 145 215 145 126 215 51 45 215 126

Modified 215 215 215 215 126 215 51 45 215 126

compressed 1 1 1 1 01 1 0011 0010 1 01

FIGURE 7. Test images

The proposed image compression and encryption tech-niques has been implemented in the working platform ofMATLAB (version7.12). This technique is performed on awindows machine having the following configuration: pro-cessor Dual-core CPU, RAM 1 GB, and Speed 2.70 GHz.The operating system is Microsoft Window 7 professional.

In this section,we analyses the performance of proposedGSA-GA algorithm, optimized wavelet filter bank and MHEhuffman algorithm, chaotic encryption algorithm.

Performance of the proposed GSA-GA algorithm

The performance of the proposed GSA-GA algorithm hasbeen evaluated using PSNR vs iteration graph shown in Fig. 8.

Even though PSNR can certainly measure the intensitydifference between two images, it is known that it may not

FIGURE 8. Performance of the proposed approach usingPSNR Vs Iteration

Table 3. Filter coefficients of the proposed GSA-GA-basedoptimized filter bank

Lo_D ( H1) Hi_D ( Ho) Lo_R ( G1) Hi_R ( G0)

0.0000 −0.0378 0.0378 0.0000

0.0378 −0.0238 −0.0238 −0.0378

−0.0238 0.1106 −0.1106 −0.0238

−0.1106 0.3774 0.3774 0.1106

0.3774 −0.8527 0.8527 0.3774

0.8527 0.3774 0.3774 −0.8527

0.3774 0.1106 −0.1106 0.3774

−0.1106 −0.0238 −0.0238 0.1106

−0.0238 −0.0378 0.0378 −0.0238

0.0378 0.0000 0.0000 −0.0378

identify the visual perceptual quality of the image. The idea ofour research is to compress unmanned vehicle images usingoptimized DWT and modified Huffman encoding. In Fig. 8,we obtain the maximum PSNR of 42.0577 db from the 5th to25th iteration, which is a very high value for the train image’Zelda(256×256). A high PSNR value means that the outputimage is of high quality.

3969

Page 10: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

Performance Analysis of the Proposed GSA-GA-basedOptimized Filter

The optimized wavelet filters in the filter bank derived fromthe hybrid GSA-GA algorithm are stable digital filters ofeach of length 10. The order of low-pass decompositionH1 and high-pass reconstruction G0 are 9 and low-passreconstruction and high-pass decomposition filters are 8. Thecoefficients of the proposed GSA-GA-based filters are shownin Table 3 and its features are listed in Table 4.

Table 4. Properties of the proposed GSA-GA-based optimizedfilters

Sl. No. Information Lo_D Hi_D Lo_R Hi_R

1 Filter Length 10 10 10 10

2 Filter Order 9 8 8 9

3 Stable Yes Yes Yes Yes

The performance of the proposed decomposition filterbank is evaluated by taking the percentage of energy retainedin each of the four sub-bands after a single decomposition andadded these percentages of energies together to get the totalenergy in percentage. In all these test cases, the total percent-age energy in each sub-band is 100, which means there is noloss of energy in decomposition. These details are listed inTable 5. Here Ea, Eh, Ev, and Ed are the energy retained in theapproximation, horizontal, vertical, and diagonal sub-bands,respectively.

The decomposition and reconstruction of image camera-man.bmp of size 256 × 256 is shown below in Fig.9

FIGURE 9. Decomposition and reconstruction of an imageusing the proposed filter

Performance Evaluation of the Chaotic EncryptionAlgorithm

The plain and cipher images, and its corresponding his-tograms from the proposed chaotic encryption,algorithm is

shown in Fig. 10. In this, the shuffling using Arnold CatMap has been carried out for 12 rounds and diffusion usingquadratic map has been carried out for 1 round.

FIGURE 10. Results of chaotic Encryption

Histogram Analysis

It is attractive for a decent encryption algorithm that the grayvalues of pixels are to be scattered in the entire pixel valuespace [27]. From the Fig. ?? and Fig. ?? it is detected thatthe there is no alteration in the histogram, even after the shuf-fling process. But after the diffusion process, we can notice

3970

Page 11: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

Table 5. Percentage of energy retained in each sub-bands

Sl.No Image Ea Eh Ev Ed Sum of Percentage of Energy

1 barbara 99.2538 0.1956 0.3397 0.2108 1002 bridge 98.5639 0.7522 0.4821 0.2017 1003 bird 99.9320 0.0183 0.0439 0.0059 1004 butterfly 96.8147 1.4804 1.2564 0.4485 100

Table 6. Correlation coefficient of two adjacent pixels for the test image Cameraman (256 × 256)

Direction of adjacent pixels Plane image Encrypted Image [Proposed] Encrypted image [27] Encrypted image [28]

Horizontal 0.9335 0.0086 -0.0017 -0.0034

Vertical 0.9592 0.0013 -0.0162 0.0061

Diagonal 0.9087 0.0055 -0.0014 0.0089

in Fig. ?? that the gray values of pixels were scattered amongthe whole space. ie, after the diffusion, the statistical attackis not effective[27].

Correlation Analysis

It is attractive for an encryption algorithm to create theencrypted image, with less linear correlation (near to 0)between its pixels in the horizontal, vertical and diagonaldirections [27]. From the correlation results are delineatedin Fig. 11, it is monitored that the there is a high correlationbetween nearby pixels of the plain image and in the encryptedimage, it is less. This because; the linear correlation in the firstimage has been changed because of encryption process.

From the Table 6, it is observed that the correlation in allthe three directions, between pixels of original image is biggerthan the encryption image. This implies the nearest pixels oforiginal image have substantial correlation yet the encryptedimage has less correlation.Also contrasted with [28] and [11],the correlation coefficient in Horizontal,Vertical and diagonalpath is less for the encrypted image from the proposed chaoticencryption algorithm.

Comparison with the literature

The performance of the chaotic encryption algorithm hasbeen evaluated using the metrics such as entropy, Irregu-lar deviation(ID), NPCR, UCAI, Uniform Histogram Devi-ation(UHD), Histogram Deviation(HD) and Correlationbetween plain and cipher images etc. mentioned in [29], [28]and [11]. Further in Table 7, these results were compared withstandard results.

FIGURE 11. Correlation between adjacent pixels in plain andencrypted image in horizontal, vertical and diagonal direction.

Performance Evaluation of the Proposed ImageCompression System

The performance in maintaining image quality after decom-pression has been carried out using the metrics such as

3971

Page 12: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

Table 7. Evaluation of Chaotic Encryption Algorithm usingTest image Cameraman(256 × 256)

Metric Proposed [28] [30] [31]Entropy 7.9963 7.9970 7.5717 7.9940Correlation −0.0018 − − 0.0024ID 0.5946 0.6034 − 0.5934HD 0.9971 − − −UHD 0.0728 0.0551 - −NPCR 99.63 98.8251 − 99.9985UCAI 31.46 33.1335 26.8856 −

MSE, PSNR [32] and SSIM [33] between the original imageand the decompressed image. Also, the metrics used forevaluating the performance of compression are, compres-sion ratio,compression rate, percentage of compression ratio(CR%) and relative data redundancy (RDR) [34] [35] betweenoriginal image and compressed image. The performanceachieved by the proposed filter in the case of reduction inMSE, improvement in image quality at bpp =1 is shown inTable 8.Also from the results shown in Table 10 and Fig-ures Fig. 12, 13, 14, 15, 16 and Fig. 17, it is observed thatthe proposed image compression algorithm achieves goodcompression result without highly affecting the quality ofdecompressed image at different bpp levels.

FIGURE 12. MSE Vs BPP for the test image ’Lena.bmp’

Further, we have compared our algorithm with other sys-tems in the literature and observed that our algorithm showsbetter performance all others. This comparison is shown inTable 9.

Table 8. Performance comparison of the proposed filter withother popular wavelet filters at bpp =1

Wavelet Filter bpp = 1

(lr)2-4 MSE PSNR SSIM

Barbara(256 × 256)bior5.5 + spiht 18.2532 35.5174 0.83349db4 + spiht 17.8421 35.6163 0.83939rbio4.4 21.0365 34.9011 0.82185optimized dwt+spiht+Humffman 16.1579 36.0470 0.85203optimized dwt+spiht+MHE 16.1579 36.0470 0.85203Cameraman(256 × 256)bior5.5 + spiht 21.4878 34.8089 0.53198db4 + spiht 20.3889 35.0369 0.54828rbio4.4 + spiht 23.5787 34.4056 0.53372optimized dwt+spiht+Humffman 18.2581 35.5163 0.5534optimized dwt+spiht+MHE 18.2581 35.5163 0.5534Einstein_orig(256 × 256)bior5.5 + spiht 1.2966 47.0026 0.55319db4 + spiht 1.2476 47.1702 0.57338rbio4.4 + spiht 1.3912 46.6968 0.56406optimized dwt+spiht+Humffman 1.1449 47.5432 0.58173optimized dwt+spiht+MHE 1.1449 47.5432 0.58173Lena(256 × 256)bior5.5 + spiht 11.2332 37.6258 0.7997db4 + spiht 10.9985 37.7175 0.81431rbio4.4 + spiht 13.4554 36.8418 0.79511optimized dwt+spiht+Humffman 9.428 38.3866 0.82473optimized dwt+spiht+MHE 9.428 38.3866 0.82473Pirate(256 × 256)bior5.5 + spiht 28.6055 33.5663 0.79127db4 + spiht 27.857 33.6815 0.80461rbio4.4 + spiht 35.7834 32.594 0.78289optimized dwt+spiht+Humffman 25.3173 34.0966 0.81556optimized dwt+spiht+MHE 457.0892 21.5308 0.25296woman_darkhair(256 × 256)bior5.5 + spiht 3.256 43.0039 0.83244db4 + spiht 3.1016 43.2149 0.84558rbio4.4 + spiht 3.78 42.3559 0.82869optimized dwt+spiht+Humffman 2.9758 43.3947 0.85224optimized dwt+spiht+MHE 2.9758 43.3947 0.85224Zelda(256 × 256)bior5.5 + spiht 4.3295 41.7664 0.91753db4 + spiht 4.2348 41.8625 0.91953rbio4.4 + spiht 5.4921 40.7335 0.90545optimized dwt+spiht+Humffman 3.9447 42.1707 0.92568optimized dwt+spiht+MHE 3.9476 42.1675 0.92568

CONCLUSION

This study has proposed a novel two-level compressionmodel, namely, SHIHT-MHE algorithm.It is to improve thecompression performance of the original input data. The opti-mized wavelet transform (DWT) is derived using hybridiza-tion of genetic and gravitational search algorithms to improvethe wavelet performance.The proposed system consists of

3972

Page 13: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

Table 9. Comparison of Proposed Method With Existing Meth-ods using Lena(256 × 256)

Method PSNR BPP

SCPSOGA[36] 27.24 0.3931

SC-CPSO[37] 27.23 0.3934

SC-GA[38] 27.41 0.4000

SGA[39] 27.30 0.4000

GA with hybrid selection[40] 27.03 0.4000

FIC using DWT[41] 28.55 0.4000

Scalable Compression Through CSA[42] 27.90 0.4156

Proposed Work(Hybrid GSA-GA) 31.6382 0.3930

GA based method [43] 30.22 0.7600

DCT transform using difference 32.67 0.7400

lookup table [44]

Proposed Work(Hybrid GSA-GA) 36.1587 0.7600

FIGURE 13. PSNR Vs BPP for the test image ’Lena.bmp’

three phases, namely, the optimized transformation phase,the Encoding phase, and the decryption and decompression.The input image is first transformed using hybrid GSA-GAalgorithm-based DWT. Then the first-level compression usingSPIHT and Chaos-based encryption is carried out. Then, thesecond-level compression scheme is proposed using merging-based Huffman encoding (MHE) algorithm. In the receivermodule, the received signal from the AWGN channel isdemodulated, decrypted, and de-compressed to have the esti-mated image. The performance of the proposed system isevaluated using unmanned vehicle images in terms of PSNR,MSE, SSIM,compression ratio and compression rate. Theperformance of encryption algorithm has been verified using

FIGURE 14. SSIM Vs BPP for the test image ’Lena.bmp’

FIGURE 15. CR% Vs BPP for the test image ’Lena.bmp’

Deviation. The simulation results indicate that the proposedsystem provides a greater compressing capacity.

3973

Page 14: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

Tabl

e10

Perf

orm

ance

com

pari

son

ofth

epr

opos

edfil

ter

with

othe

rpo

pula

rw

avel

etfil

ters

atdi

ffer

entb

ppva

lues

Wav

elet

Filte

rbp

p=

0.25

bpp

=0.

5bp

p=

0.75

MSE

PSN

RSS

IMC

RC

R%

MSE

PSN

RSS

IMC

RC

R%

MSE

PSN

RSS

IMC

RC

R%

Bar

bara

(256

×25

6)bi

or5.

5+

spih

t10

7.76

0727

.806

20.

5753

54.

0000

75.0

000

51.9

505

30.9

749

0.70

224

2.00

0150

.001

530

.076

433

.348

50.

7775

61.

3333

25db

4+

spih

t96

.312

728

.294

0.60

401

4.00

0275

.001

548

.985

31.2

302

0.71

979

250

29.7

637

33.3

939

0.78

892

1.33

3425

.001

5rb

io4.

4+

spih

t10

8.53

6827

.775

0.57

403

4.00

0275

.001

556

.270

730

.628

0.68

875

250

36.5

728

32.4

992

0.75

402

1.33

3425

.001

5op

timiz

eddw

t+sp

iht+

Hum

ffm

an89

.088

428

.632

60.

6154

84.

2151

76.2

756

45.9

047

31.5

122

0.73

22.

0844

52.0

248

25.8

609

34.0

044

0.80

539

1.37

8327

.447

5op

timiz

eddw

t+sp

iht+

MH

E89

.088

428

.632

60.

6154

84.

2189

76.2

9745

.904

731

.512

20.

732

2.08

5952

.059

941

.732

731

.926

0.75

321

1.37

9427

.502

4C

amer

aman

(256

×256

)bi

or5.

5+

spih

t14

4.59

1426

.529

40.

2957

64

7567

.973

229

.807

40.

4091

12.

0001

50.0

015

40.5

291

32.0

531

0.47

811

1.33

3325

db4

+sp

iht

140.

1821

26.6

639

0.31

491

475

64.6

907

30.0

224

0.42

661

250

37.0

615

32.4

416

0.49

458

1.33

3425

.001

5rb

io4.

4+

spih

t16

7.17

6325

.899

10.

3049

475

79.0

476

29.1

519

0.40

92

5041

.486

531

.951

70.

4814

91.

3333

25op

timiz

eddw

t+sp

iht+

Hum

ffm

an12

5.89

5727

.130

70.

3232

34.

2786

76.6

281

58.1

818

30.4

829

0.43

692

2.10

9952

.604

732

.637

332

.993

70.

5049

61.

3939

28.2

578

optim

ized

dwt+

spih

t+M

HE

125.

8957

27.1

307

0.32

323

4.28

5676

.666

358

.181

830

.482

90.

4369

22.

1118

52.6

474

32.6

373

32.9

937

0.50

496

1.39

4828

.306

6ei

nste

in_o

rig(

256×

256)

bior

5.5

+sp

iht

10.6

152

37.8

715

0.33

779

4.00

0275

.001

54.

1225

41.9

792

0.43

211

2.00

0150

.001

52.

3772

44.3

701

0.50

609

1.33

3425

.001

5db

4+

spih

t11

.197

937

.639

40.

3457

14.

0002

75.0

015

4.32

241

.774

0.44

833

250

2.17

0544

.765

20.

5266

21.

3333

25rb

io4.

4+

spih

t12

.700

537

.092

60.

3418

74.

0002

75.0

015

4.93

1441

.201

10.

4447

82.

0001

50.0

015

2.39

644

.335

90.

5170

21.

3334

25.0

015

optim

ized

dwt+

spih

t+H

umff

man

9.07

8238

.550

80.

3627

84.

2913

76.6

968

3.51

7142

.669

0.46

176

2.11

3752

.690

11.

8973

45.3

494

0.53

735

1.39

8328

.485

1op

timiz

eddw

t+sp

iht+

MH

E9.

0782

38.5

508

0.36

278

4.29

7476

.730

33.

5171

42.6

690.

4617

62.

1145

52.7

069

1.89

7345

.349

40.

5373

51.

3992

28.5

324

Len

a(25

6×25

6)bi

or5.

5+

spih

t94

.145

628

.392

80.

5557

34

7538

.304

332

.298

30.

6779

12.

0001

50.0

015

17.6

101

35.6

732

0.75

658

1.33

3325

db4

+sp

iht

88.4

708

28.6

628

0.57

774

475

37.8

343

32.3

519

0.69

865

250

18.8

5635

.376

30.

7612

11.

3334

25.0

015

rbio

4.4

+sp

iht

103.

3765

27.9

866

0.54

648

4.00

0275

.001

545

.191

31.5

803

0.67

103

2.00

0150

.001

525

.294

234

.100

60.

7308

81.

3333

25op

timiz

eddw

t+sp

iht+

Hum

ffm

an80

.112

129

.093

80.

6091

14.

2251

76.3

321

32.8

354

32.9

674

0.72

252.

094

52.2

446

16.1

433

36.0

509

0.78

221

1.38

9628

.035

optim

ized

dwt+

spih

t+M

HE

80.1

121

29.0

938

0.60

911

4.23

2576

.373

332

.835

432

.967

40.

7225

2.09

6152

.293

417

.480

535

.705

30.

7801

21.

3903

28.0

731

Pir

ate(

256×

256)

bior

5.5

+sp

iht

143.

7692

26.5

541

0.51

222

475

71.8

486

29.5

666

0.64

673

2.00

0150

.001

548

.707

31.2

549

0.72

645

1.33

3425

.001

5db

4+

spih

t13

1.56

1826

.939

50.

5305

74.

0002

75.0

015

70.1

093

29.6

730.

6679

42.

0001

50.0

015

43.7

778

31.7

183

0.75

396

1.33

3425

.001

5rb

io4.

4+

spih

t15

3.15

9826

.279

40.

4943

64.

0002

75.0

015

87.3

092

28.7

202

0.62

749

250

51.4

028

31.0

209

0.72

758

1.33

3425

.001

5op

timiz

eddw

t+sp

iht+

Hum

ffm

an12

6.69

7527

.103

10.

5410

54.

2265

76.3

397

64.7

744

30.0

168

0.67

733

2.09

9252

.363

640

.136

32.0

955

0.75

939

1.38

5527

.824

4op

timiz

eddw

t+sp

iht+

MH

E12

6.69

7527

.103

10.

5410

54.

2311

76.3

657

64.7

744

30.0

168

0.67

733

2.10

0752

.397

245

4.35

8921

.556

80.

2565

21.

3867

27.8

87w

oman

_dar

khai

r(25

6×25

6)bi

or5.

5+

spih

t24

.248

434

.284

0.62

709

475

9.28

9638

.450

80.

7368

52

504.

5859

41.5

165

0.80

114

1.33

3425

.001

5db

4+

spih

t24

.060

334

.317

80.

6323

4.00

0275

.001

59.

2045

38.4

908

0.75

235

250

4.87

8241

.248

20.

8056

61.

3334

25.0

015

rbio

4.4

+sp

iht

29.8

111

33.3

870.

5953

74.

0002

75.0

015

11.4

159

37.5

557

0.72

326

2.00

0150

.001

56.

5124

39.9

934

0.78

301

1.33

3325

optim

ized

dwt+

spih

t+H

umff

man

21.1

662

34.8

744

0.65

698

4.25

8976

.519

88.

3189

38.9

302

0.76

314

2.09

6652

.304

14.

4209

41.6

757

0.81

799

1.38

9628

.035

optim

ized

dwt+

spih

t+M

HE

21.1

662

34.8

744

0.65

698

4.26

3376

.544

28.

3189

38.9

302

0.76

314

2.09

7952

.333

116

6.13

0925

.926

30.

3406

81.

3903

28.0

746

Zel

da(2

56×2

56)

bior

5.5

+sp

iht

35.1

6132

.670

20.

7630

64.

0002

75.0

015

13.3

722

36.8

688

0.85

439

2.00

0150

.001

57.

0994

39.6

186

0.89

126

1.33

3425

.001

5db

4+

spih

t36

.113

932

.554

10.

7518

64.

0002

75.0

015

14.1

901

36.6

109

0.84

934

250

7.38

0939

.449

70.

8956

21.

3334

25.0

015

rbio

4.4

+sp

iht

47.5

699

31.3

575

0.71

737

475

19.0

518

35.3

314

0.82

059

2.00

0150

.001

59.

4029

38.3

982

0.87

635

1.33

3325

optim

ized

dwt+

spih

t+H

umff

man

31.4

928

33.1

487

0.77

976

4.23

1476

.367

212

.190

537

.270

60.

8654

12.

0865

52.0

721

6.51

5839

.991

10.

9012

71.

3827

27.6

764

optim

ized

dwt+

spih

t+M

HE

31.4

928

33.1

487

0.77

976

4.23

6976

.397

712

.190

537

.270

60.

8654

12.

0893

52.1

362

6.51

5839

.991

10.

9012

71.

3841

27.7

496

3974

Page 15: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

FIGURE 16. Compression Rate Vs BPP for the test image’Lena.bmp’

FIGURE 17. RDR Vs BPP for the test image ’Lena.bmp’

REFERENCES

[1] Z. Xiong, K. Ramchandran, M. T. Orchard, and Y.-Q.Zhang, “A comparative study of dct-and wavelet-basedimage coding,” IEEE Transactions on circuits and systemsfor video technology, vol. 9, no. 5, pp. 692–695, 1999.

[2] G. M. Davis andA. Nosratinia, “Wavelet-based image cod-ing: an overview,” in Applied and computational control,signals, and circuits. Springer, 1999, pp. 369–434.

[3] B. E. Usevitch, “A tutorial on modern lossy wavelet imagecompression: foundations of jpeg 2000,” IEEE signalprocessing magazine, vol. 18, no. 5, pp. 22–35, 2001.

[4] F. W. Moore and B. J. Babb, “Evolved transformsfor improved reconstruction of lossy-compressed nasaimages,” in Proceedings of the Companion Publication ofthe 2014 Annual Conference on Genetic and EvolutionaryComputation. ACM, 2014, pp. 1465–1466.

[5] B. J. Babb and F. W. Moore, “Achieving equal imagequality at lower bit rates using evolved image recon-struction transforms,” in IS&T/SPIE Electronic Imaging.International Society for Optics and Photonics, 2013, pp.86 600R–86 600R.

[6] R. Loganathan and Y. Kumaraswamy, “Medical imagecompression using biorthogonal spline wavelet with dif-ferent decomposition,” IJCSE International Journal onComputer Science and Engineering, vol. 2, no. 9, pp.3003–3006, 2010.

[7] S. Khuri and H.-C. Hsu, “Interactive packages for learningimage compression algorithms,” in ACM SIGCSE Bulletin,2000.

[8] R. C. Gonzales, R. E. Woods, and S. L. Eddins, Digitalimage processing using MATLAB. Pearson Prentice Hall,2004.

[9] Y. Mao and G. Chen, “Chaos-based image encryption,”Handbook of Geometric Computing, pp. 231–265, 2005.

[10] J. Ahmad, S. O. Hwang, and A. Ali, “An experimentalcomparison of chaotic and non-chaotic image encryptionschemes,” Wireless Personal Communications, vol. 84,no. 2, pp. 901–918, 2015.

[11] M. B. Younas and J. Ahmad, “Comparative analysis ofchaotic and non-chaotic image encryption schemes,” inEmerging Technologies (ICET), 2014 International Con-ference on. IEEE, 2014, pp. 81–86.

[12] L. Kocarev and S. Lian, Chaos-based cryptography: The-ory, algorithms and applications. Springer, 2011, vol.354.

[13] S. Grgic, M. Grgic, and B. Zovko-Cihlar, “Performanceanalysis of image compression using wavelets,” IndustrialElectronics, IEEE Transactions on, vol. 48, no. 3, pp. 682–695, 2001.

[14] M. Ansari and R. Anand, “Recent trends in image com-pression and its application in telemedicine and tele-consultation,” in Proceedings of XXXII National SystemsConference, 2008, pp. 59–64.

[15] N. Z. Z. Xiaolin, “One novel uav aerial video compressionmethod,” Journal of Beijing University of Aeronautics andAstronautics, vol. 10, p. 023, 2007.

[16] C. Li and J. Zhou, “Parameters identification of hydraulicturbine governing system using improved gravitational

3975

Page 16: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

search algorithm,” Energy Conversion and Management,vol. 52, no. 1, pp. 374–381, 2011.

[17] G. Syswerda, Uniform crossover in genetic algorithms.Morgan Kaufmann Publishers, Inc., 1989.

[18] J. Page, R. Poli, and W. B. Langdon, Mutation in GeneticProgramming: A Preliminary Study. Springer, 1999.

[19] E. Falkenauer, “The worth of the uniform [uniformcrossover],” in Evolutionary Computation, 1999. CEC 99.Proceedings of the 1999 Congress on, vol. 1. IEEE, 1999.

[20] A. Said and W. A. Pearlman, “A new, fast, and effi-cient image codec based on set partitioning in hierarchicaltrees,” Circuits and Systems for Video Technology, IEEETransactions on, vol. 6, no. 3, pp. 243–250, 1996.

[21] V. Bhaskaran and K. Konstantinides, Image and VideoCompression Standards: Algorithms and Architectures,ser. The Springer International Series in Engineering andComputer Science. Springer US, 2013.

[22] L. Kocarev, Z. Galias, and S. Lian, Intelligent ComputingBased on Chaos. Springer Science & Business Media,2009, vol. 184.

[23] G. Chen, Y. Mao, and C. K. Chui, “A symmetric imageencryption scheme based on 3d chaotic cat maps,” Chaos,Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004.

[24] Y. Mao, G. Chen, and S. Lian, “A novel fast image encryp-tion scheme based on 3d chaotic baker maps,” InternationalJournal of Bifurcation and Chaos, vol. 14, no. 10, pp.3613–3624, 2004.

[25] M. Eisencraft, R. Attux, and R. Suyama, Chaotic Signalsin Digital Communications, ser. Electrical Engineering &Applied Signal Processing Series. CRC Press, 2016.

[26] R. C. Gonzalez and R. E. Woods, “Image databases.”[Online]. Available: http://www.imageprocessingplace.com/root_files_V3/image_databases.htm

[27] A. Gupta, R. Thawait, K. A. K. Patro, and B. Acharya,“A novel image encryption based on bit-shuffled improvedtent map,” International Journal of Control Theory andApplications, vol. 9, no. 34, pp. 1–16, 2016.

[28] J. S. Khan, A. ur Rehman, J. Ahmad, and Z. Habib, “Anew chaos-based secure image encryption scheme usingmultiple substitution boxes,” in Information Assurance andCyber Security (CIACS), 2015 Conference on. IEEE, 2015,pp. 16–21.

[29] A. M. Ayoup, A. H. Hussein, and M. A. Attia, “Effi-cient selective image encryption,” Multimedia Tools andApplications, vol. 75, no. 24, pp. 17 171–17 186, 2016.

[30] M. G. Avasare and V. V. Kelkar, “Image encryption using

chaos theory,” in Communication, Information & Comput-ing Technology (ICCICT), 2015 International Conferenceon. IEEE, 2015, pp. 1–6.

[31] A. M. Riad, A. H. Hussein, H. M. Kasem, and A. A. EL-AZM, “A new efficient image encryption technique basedon arnold and idea algorithms,” in International Confer-ence on Image and Information Processing (ICIIP 2012),vol. 46, 2012.

[32] Q. Huynh-Thu and M. Ghanbari, “Scope of validity of psnrin image/video quality assessment,” Electronics letters,vol. 44, no. 13, pp. 800–801, 2008.

[33] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli,“Image quality assessment: from error visibility to struc-tural similarity,” IEEE transactions on image processing,vol. 13, no. 4, pp. 600–612, 2004.

[34] M. Cherifi, M. Lahdir, and S. Ameur, “Sorted run lengthcoding-application to meteosat image compression,” inEnvironmental Engineering and Computer Application(ICEECA 2014),Hong Kong., K. Chan, Ed. Taylor &Francis Group, London, December 2015, pp. 159–163.

[35] S. A. El-said, K. F. Hussein, and M. M. Fouad, “Imagecompression technique for low bit rate transmission,” Inter-national Journal of ComputerVision and Image Processing(IJCVIP), vol. 1, no. 4, pp. 1–18, 2011.

[36] G. Vahdati, H. Khodadadi, M. Yaghoobi, and M.-R.Akbarzadeh-T, “Fractal image compression based on spa-tial correlation and hybrid particle swarm optimizationwith genetic algorithm,” in Software Technology and Engi-neering (ICSTE), 2010 2nd International Conference on,vol. 2. IEEE, 2010, pp. V2–185.

[37] G. Vahdati, M.Yaghoobi, and M. R. Akbarzadeh-Totonchi,“Fractal image compression based on spatial correlationand chaotic particle swarm optimization,” in Hybrid Intel-ligent Systems (HIS), 2010 10th International Conferenceon. IEEE, 2010, pp. 131–134.

[38] M.-S. Wu, W.-C. Teng, J.-H. Jeng, and J.-G. Hsieh, “Spatialcorrelation genetic algorithm for fractal image compres-sion,” Chaos, Solitons & Fractals, vol. 28, no. 2, pp.497–510, 2006.

[39] M.-S. Wu, J.-H. Jeng, and J.-G. Hsieh, “Schema geneticalgorithm for fractal image compression,” EngineeringApplications of Artificial Intelligence, vol. 20, no. 4, pp.531–538, 2007.

[40] M.-S. Wu and Y.-L. Lin, “Genetic algorithm with a hybridselect mechanism for fractal image compression,” DigitalSignal Processing, vol. 20, no. 4, pp. 1150–1161, 2010.

[41] M.-S. Wu, “Genetic algorithm based on discrete wavelettransformation for fractal image compression,” Journal of

3976

Page 17: OptimizedWavelet Filters and Modified Huffman Encoding ... · rate. Further the chaotic encryption algorithm has been eval-uated using suitable metrics, Experimental results show

International Journal of Applied Engineering Research, ISSN 0973-4562 Volume 12, Number 13 (2017) pp. 3961–3977© Research India Publications, http://www.ripublication.com

Visual Communication and Image Representation, vol. 25,no. 8, pp. 1835–1841, 2014.

[42] J. Zhou, O. C. Au, G. Zhai, Y. Y. Tang, and X. Liu,“Scalable compression of stream cipher encrypted imagesthrough context-adaptive sampling,” IEEE transactions onInformation Forensics and Security, vol. 9, no. 11, pp.1857–1868, 2014.

[43] S. K. Mitra, C. Murthy, and M. Kundu, “Image compres-sion and edge extraction using fractal technique and geneticalgorithm,” in Soft Computing for Image Processing.Springer, 2000, pp. 79–100.

[44] A. Messaoudi and K. Srairi, “Colour image compressionalgorithm based on the dct transform using differencelookup table,” Electronics Letters, vol. 52, no. 20, pp.1685–1686, 2016.

3977