Comparison Study of Different Lossy Compression Techniques Applied on Digital Mammogram Images
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 12
Abstract
The huge growth of the usage of internet increases the need to transfer and save multimedia files. Mammogram images are part of these files that have large image size with high resolution. The compression of these images is used to reduce the size of the files without degrading the quality especially the suspicious regions in the mammogram images. Reduction of the size of these images gives more chance to store more images and minimize the cost of transmission in the case of exchanging information between radiologists. Many techniques exists in the literature to solve the loss of information in images. In this paper, two types of compression transformations are used which are Singular Value Decomposition (SVD) that transforms the image into series of Eigen vectors that depends on the dimensions of the image and Discrete Cosine Transform (DCT) that covert the image from spatial domain into frequency domain. In this paper, the Computer Aided Diagnosis (CAD) system is implemented to evaluate the microcalcification appearance in mammogram images after using the two transformation compressions. The performance of both transformations SVD and DCT is subjectively compared by a radiologist. As a result, the DCT algorithm can effectively reduce the size of the mammogram images by 65% with high quality microcalcification appearance regions.
Authors and Affiliations
Ayman AbuBaker, Mohammed Eshtay, Maryam AkhoZahia
Design and Implementation for Multi-Level Cell Flash Memory Storage Systems
The flash memory management functions of write coalescing, space management, logical-to-physical mapping, wear leveling, and garbage collection require significant on-going computation and data movement. MLC flash memory...
Evaluation of the Performance of the University Information Systems: Case of Moroccan Universities
The purpose of this paper is to develop a conceptual model of university information systems performance measurement. To do this resorted to the choice of 3E-3P model. This model proposes a development under the spectrum...
Gatekeepers Practices in Knowledge Diffusion within Saudi Organizations: KFMC Case Study
Gatekeepers in organizations play a critical role in terms of disseminating and transferring outside knowledge into their groups. This research contributes in identifying the gatekeepers' practices in terms of gathering,...
A Harmony Search Based Algorithm for Detecting Distributed Predicates
Detection of distributed predicates (also referred to as runtime verification) can be used to verify that a particular run of a given distributed program satisfies certain properties (represented as predicates). Conseque...
DLBS: Decentralize Load-Balance Scheduling Algorithm for Real-Time IoT Services in Mist Computing
Internet of Things (IoT) has been industrially investigated as Platforms as a Services (PaaS). The naive design of these types of services is to join the classic centralized Cloud computing infrastructure with IoT servic...