{"title":"Quad-tree-based image shape coding with block compensation","authors":"Lih-Yang Wang, Ching-Hui Lai, Kuan-Ren Pan","doi":"10.1109/ICITA.2005.227","DOIUrl":null,"url":null,"abstract":"Image shape coding is a core technique in MPEG-4. In the paper, we present a quad-tree-based technique for image object shape coding. Quad tree has been used to represent the image content since long time ago, it describes the hierarchy of various sizes of rectangular blocks that collectively constitute the image object area. Quad tree structure can be quite complicate to describe an image object with unsmooth boundary. We propose a block compensation and a run-length scheme to effectively attack the problem. Experimental results show that the algorithm is quite efficient in comparison with other methods.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Third International Conference on Information Technology and Applications (ICITA'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITA.2005.227","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Image shape coding is a core technique in MPEG-4. In the paper, we present a quad-tree-based technique for image object shape coding. Quad tree has been used to represent the image content since long time ago, it describes the hierarchy of various sizes of rectangular blocks that collectively constitute the image object area. Quad tree structure can be quite complicate to describe an image object with unsmooth boundary. We propose a block compensation and a run-length scheme to effectively attack the problem. Experimental results show that the algorithm is quite efficient in comparison with other methods.