Image Compression and Protection Systems Based on Atomic Functions
Keywords:atomic function, image compression, image protection, discrete atomic transform
Digital images are a particular type of data. They have numerous applications. Taking into account current challenges and trends, image compression and protection have to be ensured. Data format, which provides fast analysis of the image compressed, is needed. In order to satisfy a combination of these requirements, an appropriate information system should be developed. In this paper, we design such a system based on atomic functions (AF) that are solutions of special functional differential equations and, in terms of function theory, are as good constructive tools as trigonometric polynomials. AF-based image processing system (AFIPS), which satisfies the requirements considered, is developed. A core of this system is discrete atomic transform (DAT). Data protection feature of AFIPS is provided by the possibility to vary a structure of the procedure DAT. Constructive approximation properties of AF ensure high lossy and lossless image compression, as well as good image representation by DAT-coefficients. Software implementation of AFIPS is investigated. The results of test data processing are given.
X.-Y. Tong, G.-S. Xia, Q. Lu, H. Shen, S. Li, S. You, L. Zhang, “Land-cover classification with high-resolution remote sensing images using transferable deep models,” Remote Sens. Environ., vol. 237, 111322, 2020. https://doi.org/10.1016/j.rse.2019.111322.
R. P. Sishodia, R. L. Ray, S. K. Singh, “Applications of remote sensing in precision agriculture: A review,” Remote Sens., vol. 12, no. 19, 3136, 2020. https://doi.org/10.3390/rs12193136.
R. Lian, W. Wang, N. Mustafa, L. Huang, “Road extraction methods in high-resolution remote sensing images: A comprehensive review,” IEEE J. Sel. Topics Appl. Earth Observ. Remote Sens., vol. 13, pp. 5489-5507, 2020. https://doi.org/10.1109/JSTARS.2020.3023549.
I. Castiglioni, L. Rundo, M. Codari, G. Leo, C. Salvatore, M. Interlenghi, F. Gallivanone, A. Cozzi, N.C. D'Amico, F. Sardanelli, “AI applications to medical images: From machine learning to deep learning,” Physica Medica, vol. 83, pp. 9-24, 2021. https://doi.org/10.1016/j.ejmp.2021.02.006.
X. Liu, L. Song, S. Liu, Y. Zhang, “A review of deep-learning-based medical image segmentation methods,” Sustainability, vol. 13, 1224, 2021. https://doi.org/10.3390/su13031224.
M. H. Hesamian, W. Jia, X. He, P. Kennedy, “Deep learning techniques for medical image segmentation: Achievements and challenges,” J. Digit. Imaging, vol. 32, pp. 582–596, 2019. https://doi.org/10.1007/s10278-019-00227-x.
B. T. Naik, M. F. Hashmi, N. D. Bokde, “A comprehensive review of computer vision in sports: Open issues, future trends and research directions,” Appl. Sci., vol. 12, 4429, 2022. https://doi.org/10.3390/app12094429.
Y.-H. Wang, W.-H. Su, “Convolutional neural networks in computer vision for grain crop phenotyping: A review,” Agronomy, vol. 12, 2659, 2022. https://doi.org/10.3390/agronomy12112659.
D. Ai, G. Jiang, S.-K. Lam, P. He, C. Li, “Computer vision framework for crack detection of civil infrastructure – A review,” Engineering Applications of Artificial Intelligence, vol. 117, part A, 105478, 2023. https://doi.org/10.1016/j.engappai.2022.105478.
J. Bernacki, “A survey on digital camera identification methods,” Forensic Science International: Digital Investigation, vol. 34, 300983, 2020. https://doi.org/10.1016/j.fsidi.2020.300983.
N. Suresh, C. Janakiram, S. Nayar, V.N. Krishnapriya, A. Mathew, “Effectiveness of digital data acquisition technologies in the fabrication of maxillofacial prostheses – A systematic review,” Journal of Oral Biology and Craniofacial Research, vol. 12, no. 1, pp. 208-215, 2022. https://doi.org/10.1016/j.jobcr.2021.12.004.
T. Feng, F. Fan, T. Bednarz, “A review of computer graphics approaches to urban modeling from a machine learning perspective,” Front. Inform. Technol. Electron. Eng., vol. 22, pp. 915–925, 2021. https://doi.org/10.1631/FITEE.2000141.
J. Pirker, A. Dengel, “The potential of 360° virtual reality videos and real VR for education – A literature review,” IEEE Computer Graphics and Applications, vol. 41, no. 4, pp. 76-89, 2021. https://doi.org/10.1109/MCG.2021.3067999.
The SICAS Medical Image Repository, [Online]. Available at: https://www.smir.ch
Sentinel-2, [Online]. Available at: https://sentinel.esa.int/web/sentinel/missions/sentinel-2
Large-scale CelebFaces Attributes (CelebA) Dataset, [Online]. Available at: http://mmlab.ie.cuhk.edu.hk/projects/CelebA.html
K. Sayood, Introduction to Data Compression, fifth ed., Morgan Kaufman, 2017, 765 p. https://doi.org/10.1016/B978-0-12-809474-7.00019-7.
Y.-Q. Shi, H. Sun, Image and Video Compression for Multimedia Engineering, CRC Press, Boca Raton, 2019, 576 p. https://doi.org/10.1201/9781315097954.
M. A. Rahman, M. Hamada, “Lossless image compression techniques: A state-of-the-art survey,” Symmetry, vol. 11, 1274, 2019. https://doi.org/10.3390/sym11101274.
Global Losses from Cybercrime Skyrocketed to Nearly $1 Trillion in 2020, New Report Finds, [Online]. Available at: https://www.washingtonpost.com/politics/2020/12/07/cybersecurity-202global-losses-cybercrime-skyrocketed-nearly-1-trillion-2020
A. A. Mukhlif, B. Al-Khateeb, M. A. Mohammed, “An extensive review of state-of-the-art transfer learning techniques used in medical imaging: Open issues and challenges,” Journal of Intelligent Systems, vol. 31, no. 1, pp. 1085-1111, 2022. https://doi.org/10.1515/jisys-2022-0198.
Q. Yang, Y. Zhang, W. Dai, S.J. Pan, Transfer Learning, first ed., Cambridge University Press, 2020, 390 p. https://doi.org/10.1017/9781139061773.
J. W. Seow, M. K. Lim, R. C. W. Phan, J. K. Liu, “A comprehensive overview of Deepfake: Generation, detection, datasets, and opportunities,” Neurocomputing, vol. 513, no. 7, pp. 351-371, 2022. https://doi.org/10.1016/j.neucom.2022.09.135.
J. M. Kizza, Guide to Computer Network Security; Springer: Cham, Switzerland, 2020, 569 p. https://doi.org/10.1007/978-3-030-38141-7.
M. Singh, A.K. Singh, “A comprehensive survey on encryption techniques for digital images,” Multimed. Tools. Appl., vol. 82, pp. 11155–11187, 2023. https://doi.org/10.1007/s11042-022-12791-6.
B. Zolfaghari, T. Koshiba, “Chaotic image encryption: State-of-the-art, ecosystem, and future roadmap,” Applied System Innovation, vol. 5, no. 3, 57, 2022. ttps://doi.org/10.3390/asi5030057.
S. Xu, H. Zhang, Z. Wang, “Thermal management and energy consumption in air, liquid, and free cooling systems for data centers: A review,” Energies, vol. 16, no. 3, 1279, 2023. https://doi.org/10.3390/en16031279.
S. A. H. Mohsan, M. A. Khan, F. Noor, I. Ullah, M. H. Alsharif, “Towards the unmanned aerial vehicles (UAVs): A comprehensive review,” Drones, vol. 6, no. 6, 147, 2022. https://doi.org/10.3390/drones6060147.
J. Shahmoradi, E. Talebi, P. Roghanchi, M. A. Hassanalian, “Comprehensive Review of Applications of Drone Technology in the Mining Industry,” Drones, vol. 4, no. 3, 34, 2020. https://doi.org/10.3390/drones4030034.
E. T. Michailidis, D. Vouyioukas, “A review on software-based and hardware-based authentication mechanisms for the Internet of Drones,” Drones, vol. 6, no. 2, 41, 2022. https://doi.org/10.3390/drones6020041.
M. Hemsworth, From Sporty Lifestyle Brand Earbuds to Compact RGB Soundbars, 2022, [Online]. Available at: https://www.trendhunter.com/slideshow/october-2022-gadgets.
A. Rayes, S. Salam, Internet of Things from Hype to Reality: The Road to Digitization, third ed., Springer: Cham, Switzerland, 2022, 481 p. https://doi.org/10.1007/978-3-030-90158-5.
Y. Mansouri, M. Ali Babar, “A review of edge computing: Features and resource virtualization,” J. Parallel Distrib. Comput., vol. 150, pp. 155–183, 2021. https://doi.org/10.1016/j.jpdc.2020.12.015.
R. C. Gonzalez, R. E. Woods, Digital Image Processing, fourth ed., Pearson, London, UK, 2018, 1192 p.
C. K. Chui, Q. Jiang, Applied Mathematics: Data Compression, Spectral Methods, Fourier Analysis, Wavelets, and Applications, Atlantis Press, Paris, France, 2013, 1089 p. https://doi.org/10.2991/978-94-6239-009-6.
L. Schumaker, Spline Functions: Basic Theory, third ed., Cambridge University Press, 2007, 600 p. https://doi.org/10.1017/CBO9780511618994.
V. L. Rvachev, V. A. Rvachev, Non-classical methods of approximation theory in boundary-value problems, Naukova dumka, Kyiv, p. 196, 1979.
V. A. Rvachev, “Compactly supported solutions of functional-differential equations and their applications,” Russ. Math. Surv., vol. 45, pp. 87–120, 1990. https://doi.org/10.1070/RM1990v045n01ABEH002324.
T. Guo, T. Zhang, E. Lim, M. López-Benítez, F. Ma, L. Yu, “A review of wavelet analysis and its applications: Challenges and opportunities,” IEEE Access, vol. 10, pp. 58869-58903, 2022. https://doi.org/10.1109/ACCESS.2022.3179517.
S. Welstead, Fractal and Wavelet Image Compression Techniques, SPIE Publications: Bellingham, WA, USA, 1999, 254 p. https://doi.org/10.1117/3.353798.
V. Makarichev, V. Lukin, I. Brysina, “on the applications of the special class of atomic functions: Practical aspects and perspectives,” in M. Nechyporuk, V. Pavlikov, D. Kritskiy (Eds.), Integrated Computer Technologies in Mechanical Engineering - 2020. ICTM 2020. Lecture Notes in Networks and Systems, Springer: Cham, Switzerland, vol. 188, 2021, pp. 42–54. https://doi.org/10.1007/978-3-030-66717-7_4.
V. Makarichev, I. Vasilyeva, V. Lukin, B. Vozel, A. Shelestov, N. Kussul, “Discrete atomic transform-based lossy compression of three-channel remote sensing images with quality control,” Remote Sens., vol. 14, no. 1, 125, 2022. https://doi.org/10.3390/rs14010125.
V. Makarichev, V. Lukin, O. Illiashenko, V. Kharchenko, “Digital image representation by atomic functions: The compression and protection of data for edge computing in IoT systems,” Sensors, vol. 22, no. 10, 3751, 2022. https://doi.org/10.3390/s22103751.
N. Kozhemiakina, N. Ponomarenko, “Methods of data compression for traffic monitoring tools of communication,” Radioelectron. Comput. Syst., vol. 75, no. 1, pp. 84–88, 2016.
V. Makarichev, V. Kharchenko, “Application of dynamic programming approach to computation of atomic functions,” Radioelectron. Comput. Syst., vol. 100, no. 4, pp. 36–45, 2021. https://doi.org/10.32620/reks.2021.4.03.
V. Makarichev, O. Dotsenko, ATools Software Development Kit: image processing technologies using finite functions, The Certificate on official registration of software, no. 111460, January 31, 2022.
V. Makarichev, V. Lukin, I. Brysina, “Comparison of DAT with DCT in a viewpoint of current image processing and analysis trends,” Proceedings of the 12th International Conference on Dependable Systems, Services and Technologies (DESSERT), Athens, Greece, December 9-11, 2022, pp. 1-7. https://doi.org/10.1109/DESSERT58054.2022.10018647.
M. Kolisnyk, “Vulnerability analysis and method of selection of communication protocols for information transfer in Internet of Things systems,” Radioelectron. Comput. Syst., vol. 97, no. 1, pp. 133–149, 2021. https://doi.org/10.32620/reks.2021.1.12.
C. Bayılmış, M. Ali Ebleme, Ü. Çavuşoğlu, K. Küçük, A. Sevin, “A survey on communication protocols and performance evaluations for Internet of Things,” Digital Communications and Networks, vol. 8, no. 6, pp. 1094-1104, 2022. https://doi.org/10.1016/j.dcan.2022.03.013.
Z. Chang, S. Liu, X. Xiong, Z. Cai, G. Tu, “A survey of recent advances in edge-computing-powered artificial intelligence of things,” IEEE Internet Things J., vol. 8, pp. 13849–13875, 2021. https://doi.org/10.1109/JIOT.2021.3088875.
B. Meden, P. Rot, P. Terhörst, N. Damer, A. Kuijper, W. J. Scheirer, A. Ross, P. Peer, V. Štruc, “Privacy–enhancing face biometrics: A comprehensive survey,” IEEE Trans. Inf. Forensics Secur., vol. 16, pp. 4147–4183, 2021. https://doi.org/10.1109/TIFS.2021.3096024.
J. Shahid, R. Ahmad, A. K. Kiani, T. Ahmad, S. Saeed, A. M. Almuhaideb, “Data protection and privacy of the Internet of Healthcare Things (IoHTs),” Applied Sciences, vol. 12, no. 4, 1927, 2022. https://doi.org/10.3390/app12041927.
M. H. Ahmed, A. K. Shibeeb, F. H. Abbood, “An efficient confusion-diffusion structure for image encryption using plain image related Henon map,” International Journal of Computing, vol. 19, no. 3, pp. 464-473, 2020. https://doi.org/10.47839/ijc.19.3.1895.
X. Gao, J. Mou, L. Xiong, Y. Sha, H. Yan, Y. Cao, “A fast and efficient multiple images encryption based on single-channel encryption and chaotic system,” Nonlinear Dyn., vol. 108, 613–636, 2022. https://doi.org/10.1007/s11071-021-07192-7.
How to Cite
LicenseInternational Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:
• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.