An enhanced block-based hierarchical image coding scheme

Shuyuan Zhu*, Bing Zeng

*Corresponding author for this work

Research output: Chapter in Book/Conference Proceeding/ReportConference Paper published in a bookpeer-review

Abstract

A block-based, two-layer hierarchical image coding scheme codes a down-sampled version of the original image first, and then the residue between the original one and a reconstructed version that is interpolated from the upper layer. When the residual layer is coded at a lower quality as compared to its upper layer, it often happens that all pixels in the upper layer will be deteriorated if the corresponding coded residuals are added into them. In this paper, we demonstrate that there exists a critical region for each image such that the deterioration indeed happens and this region includes nearly all typical bit-rates used in practice. To avoid this problem, we first propose a 'naive' solution and then apply an advanced quantization technique to handle the residual layer. To verify the effectiveness, we conduct extensive tests to show that the gap between the hierarchical coding scheme and its single-level counterpart (which is typically around 2∼3 dB in the two-layer scenario) has been filled up by a rather big percentage (about 30∼50%).

Original languageEnglish
Title of host publication2012 IEEE International Conference on Image Processing, ICIP 2012 - Proceedings
Pages2513-2516
Number of pages4
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event2012 19th IEEE International Conference on Image Processing, ICIP 2012 - Lake Buena Vista, FL, United States
Duration: 30 Sept 20123 Oct 2012

Publication series

NameProceedings - International Conference on Image Processing, ICIP
ISSN (Print)1522-4880

Conference

Conference2012 19th IEEE International Conference on Image Processing, ICIP 2012
Country/TerritoryUnited States
CityLake Buena Vista, FL
Period30/09/123/10/12

Fingerprint

Dive into the research topics of 'An enhanced block-based hierarchical image coding scheme'. Together they form a unique fingerprint.

Cite this