Share Email Print
cover

Proceedings Paper

EBLAST: efficient high-compression image transformation: I. Background and theory
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

In this paper, the first of a two-part series, a high- compression image transformation (called EBLAST for Enhanced Blurring, Local Averaging, and Thresholding) is presented that facilitates image transmission along low-bandwidth channels such as acoustic modems, and exhibits low mean- squared error with spatially uniform reconstruction error. Although initially applied to tactical communication problems, this innovative transform Blurring, Local Averaging, and Thresholding), can be used in commercial applications such as videotelephony. EBLAST's compression ratio (CR), which usually ranges from 100:1 to as high as 250:1 on underwater imagery, can in some cases be increased by follow-on Huffman encoding to yield CR approximating 300:1 with no additional information loss. Additionally, in previous work the authors showed that restriction of the source image to typical targets of interest, followed by compression, could increase CR to 20,000:1 or greater. In such cases, background information is characterized, then discarded prior to compression. In the decompression step, the background is approximately reconstructed from statistical parameters, which can provide verisimilitude for human target cueing applications.

Paper Details

Date Published: 16 December 1999
PDF: 13 pages
Proc. SPIE 3814, Mathematics of Data/Image Coding, Compression, and Encryption II, (16 December 1999); doi: 10.1117/12.372743
Show Author Affiliations
Mark S. Schmalz, Univ. of Florida (United States)
Gerhard X. Ritter, Univ. of Florida (United States)
Frank M. Caimi, Harbor Branch Oceanographic Institution (United States)


Published in SPIE Proceedings Vol. 3814:
Mathematics of Data/Image Coding, Compression, and Encryption II
Mark S. Schmalz, Editor(s)

© SPIE. Terms of Use
Back to Top