One example of pattern-target relation

## 1. Introduction

The standard dynamic image compression is usually composed of motion compensation and a DCT transformation for the error image from the motion compensation. The DCT coefficients are also classified by the cases to be coded by Huffman compression. However, the DCT coding will be inefficient for the binary images due to its broad dynamic range. It is noted that the binary images are usually described properly by their shapes. In this sense, a novel idea of shape compensation is proposed to replace the DCT processing. A schematic diagram to present this idea is illustrated in Fig. 1.

More clearly, the binary dynamic images are compressed by the shape compensation following the motion compensation. Our binary images are coded by the motion vectors and the kinds of shape transformations. For this transformation, a morphological filter is selected to modify the shape of the objects in image. Morphological processing [1] is a type of operation, by which the spatial form or structure of objects within an image are modified in a nonlinear way. The computation cost of nonlinear processing for conventional numerical image processing is very expensive. However, the morphology image processing treats the image components as sets and deals with the changes of shapes very efficiently. Thus, the morphology processing has recently been applied successfully to the industry auto-inspection and medical image processing [2-3]. The efficiency of morphological image processing makes the shape compensation in the decoding procedure very simple.

## 2. Conventional compensation method: Motion compensation

It is the speech transmission conventionally to be the major application in the real time communication. Thus, the basic rate in ISDN (Integrated Services Digital Network) was 2B+D = 2*64+16 kbps in earlier days. Accordingly, there is no motive to propose video coding with fewer bit rates. As one example, video conference was developed under the ITU H.320 [4]. One exceptional research [5] works on the video coding to fit into the 20-40 kbps bandwidth range because this range can be stably provided in the 2.5 G wireless networks such as General Packet Radio Service (GPRS) and Code Division Multiple Access (CDMA) although the theoretical bandwidths of GPRS and CDMA 1X are 115 and 153.6 kbps respectively. In this mainstream, MPEG/H.26x [6] performs well in the bandwidth range about 64 kbps.

The MPEG digital video-coding techniques are statistical in nature. Video sequences usually contain statistical redundancies in both temporal and spatial directions. The basic statistical property upon which MPEG compression techniques rely is inter pixel correlation, including the assumption of simple, correlated motion between consecutive frames. Thus, it is assumed that the magnitude of a particular image pixel can be predicted from nearby pixels within the same frame (using intraframe coding techniques) or from pixels of a nearby frame (using interframe techniques). Intuitively, it is clear that in some circumstances, i.e., during scene changes of a video sequence, the temporal correlation between pixels in nearby frames is small or even vanishes. The video scene then assembles a collection of uncorrelated still images. In this case, intraframe coding techniques are appropriate to explore spatial correlation to achieve efficient data compression.

Motion in many video-conferencing scenes can be modeled to be primarily translational in nature. One popular procedure to estimate this type of motion is the block-matching technique [7]. Here the motion of a group of pixels (block) is represented by a single displacement vector, which is found by a matching technique. The so-called block motion-compensated coding schemes estimate the displacements of moving objects and only encode the block differences in moving areas between the current frame and the translated previous frame. Researchers have shown that this technique can increase coding efficiency significantly. A complete block motion-compensated coding system typically consists of three stages: (1) a motion detector which detects the moving blocks, (2) a displacement estimator which estimates the displacement vectors of moving blocks, and (3) a data compressor, which encodes the differences after motion compensation. Some terminology excerpted from GENERIC CODING OF MOVING PICTURES AND ASSOCIATED AUDIO, Recommendation H.262, ISO/IEC 13818-2 [8] are listed below for quick reference.

## 3. Terminology

Macroblock: The four 8-by-8 blocks of luminance data and the two (for 4:2:0 chrominance format), four (for 4:2:2 chrominance format) or eight (for 4:4:4 chrominance format) corresponding 8-by-8 blocks of chrominance data coming from a 16-by-16 section of the luminance component of the picture. Macroblock is sometimes used to refer to the sample data and sometimes to the coded representation of the sample values and other data elements defined in the macroblock header of the syntax defined in this part of this specification. The usage is clear from the context.

Motion compensation: The use of motion vectors to improve the efficiency of the prediction of sample values. The prediction uses motion vectors to provide offsets into the past and/or future reference frames or reference fields containing previously decoded sample values that are used to form the prediction error signal.

Motion estimation: The process of estimating motion vectors during the encoding process.

Motion vector: A two-dimensional vector used for motion compensation that provides an offset from the coordinate position in the current picture or field to the coordinates in a reference frame or reference field.

Non-intra coding: Coding of a macroblock or picture that uses information both from itself and from macroblocks and pictures occurring at other times.

P-field picture: A field structure P-Picture.

P-frame picture: A frame structure P-Picture.

P-picture; predictive-coded picture : A picture that is coded using motion compensation.

With the above terminology, some illustrating examples and schematic diagrams are presented below to explain the details of motion compensation in MPEG.

## 4. Shape transform by mathematical morphology

Mathematical morphology refers to a branch of nonlinear image processing and analysis developed initially by Serra [1] that concentrates on the geometric structure within an image. The morphological approach is generally based upon the analysis of a two value image with some predetermined geometric shape known as a structuring element. The basic idea, arising out of stereology, is to probe an image with a structuring element and to quantify the manner in which the structuring element fits or does not fit within the image. The analysis of the geometric objects must be quantitative, because only such an analysis and description of geometric objects can provide a coherent mathematical framework for describing the spatial organization. The quantitative description of geometrical structures is the purpose of mathematical morphology.

The scope of morphological method is as wide as image processing itself. These include enhancement, segmentation, restoration, edge detection, texture analysis, particle analysis, feature generation, skeletonization, shape analysis, compression, component analysis, curve filling, and general thinning. There are many areas where morphological methods have been successfully applied, including robot vision, inspection, microscopy, medical imaging, remote sensing, biology, metallurgy, and automatic character reading.

The language of mathematical morphology is set theory. As such, morphologies offer a unified and powerful approach to numerous image processing problem. Sets in mathematical morphology represent the shapes of objects in an image. In binary images, the sets in question are members of 2-D integer space

In the following sections we illustrate several important concepts in mathematical morphology, and a detailed discussion can be found in [1].

### 4.1. Dilation and erosion

The simplest morphological transformation is dilation and erosion. In loose terms, these operations cause the swelling or the shrinking of areas when structuring element has a disklike shape. They are the base for most of the morphological operations discussed later.

Some basic definitions

Let A and B be sets in

The reflection of B, denoted

The complement of set A is

#### 4.1.1. Dilation

With image A and a structuring element B as sets in

There are two equivalent formulations of dilation that deserve. First,

So that the dilation can be found by translating the input image by all points in the structuring element and then taking the union. Fig 2.1 illustrates the concept.

Another formulation of dilation involves translates of the rotated structuring element that "hit"(intersect) the input image.

Thus the dilation process consists of obtaining the reflection of B about its origin and then shifting this reflection by x. The dilation of A by B then is the set of all x displacements such that

#### 4.1.2. Erosion

For sets A and B in

Equivalently, we may write

Here, the erosion is found by intersecting all translates of the input image by negatives of points in the structuring element. The method is illustrated in Fig 2.2.

Another definition of erosion is the following:

Which, in words, says that the erosion of A by B is the set of all point x such that B, translate by x, is contained in A. If the origin lies inside the structuring element, then erosion has the effect of shrinking the input image. Geometrically, the disk B has been moved around inside of A and the positions of the origin has been marked to produce the eroded image. Formally, we can state the following property: if the origin is contained within the structuring element, then the eroded image is a subset of the input image.

Dilation and erosion are duals of each other with respect to set complementation and reflection. That is,

proof: Let

If we think of a disk structuring element, then dilation fill in small (relative to the disk) holes and protrusions into image, whereas erosion eliminates small components and extrusions of the image into its complement. Here, we only discuss the implementation of dilation instead of erosion. Applying the duality property of dilation and erosion, we can easily employ both logical and geometric negation to implement erosion because of the different roles of the image and the structuring element in an expression employing these morphological operations.

## 5. Application of Matheron representation theorem

Matheron representation theorem with the notion of kernel and basis are the fundamental theory for morphological filter applied to video coding. However, the theory of representation of morphological filter is usually lengthy in textbooks [1]. We therefore have a brief introduction here.

The basic image operations for morphology processing are dilation and erosion. Erosion is the dual of dilation. They are totally built upon the Boolean operations: set union, intersection and complementation. The result of the dilation is the union of all translates of the original image. Every translation distance is determined by the coordinate of the corresponding black pixel in another image called the structuring element.

A mapping Ψ : 2^{R*R} → 2^{R*R} is increasing if whenever A ⊂ B, then Ψ (A) ⊂ Ψ (B).

The definition of decreasing can be similarly defined.

A mapping Ψ is translation invariant if Ψ(T(A)) = T(Ψ (A)) for all A ∈ 2R*R, where T is the translation mapping.

The kernel of an increasing translation invariant mapping Ψ, denoted by Ker[Ψ], is important to the theory of morphological filters and is defined by the collection of all the images that will contain the origin pixel (0, 0) mapped by that translation invariant mappingΨ.

The set of kernel can be further reduced to the basis defined below.

A basis for the Kernel of an increasing translation invariant mapping is defined by satisfying the following two conditions:

No element of this basis is a proper subimage of any other element of this basis

For any element T belonging to the corresponding kernel, there exists an element T’ of this basis such that T’ is a subset T.

Any increasing (decreasing) translation invariant morphological filter can be expressed as a union (intersection) of erosions (dilation) over sets of its kernel as follows

Ψ(A) = ∪ B∈Ker[Ψ] Erosion(A, B).

Ψ(A) = ∪ B∈Bas[Ψ]Erosion(A, B), where Bas[Ψ] is the basis of Ker[Ψ].

From Matheron representation theorem, every decreasing (increasing) translation invariant image mapping can be composed of a union (join) of erosion (dilation) operations. According to this theorem, the idea of kernel for the above mentioned increasing mapping is introduced by referring the set of the structuring elements of those erosions or dilations to characterize that mapping. Furthermore, to simplify the computation of the above mapping, the concept of the basis for kernel is further introduced, borrowing the idea of the basis from linear space, to reduce the number of the involved structuring elements.

As a summary, the morphological mapping is characterized by its kernel, and the kernel is characterized by its basis. Consequently, the proposed morphological transform (shape compensation) is coded by the kinds of basis or morphological filter.

## 6. Shape compensation: Selection of morphological filters

The concept of shape compensation is implemented on two image blocks: source block and target block. The source block is shape compensated (filtered) to look like the target block. The frames are divided into blocks of the size of 16*16. We need to select a filter for each source block. We first define the pattern of a cross form on the source block. In the proposed coding method, the source block is the motion compensated previous coded block and the target block is the current coding block.

We then define the target pixel on the target block by the corresponding pixel with a same center location for the pattern on the source block. For each pattern, the filtered result is either consistent with the target pixel or not. The optimal filter is the filter causing the least inconsistent results. The optimal filter can be selected pattern by pattern. To reduce computation, the filter is selected group by group. The group is the pattern group classified by its kind of pattern. There are only 32 groups in the 14*14 patterns from the source block. The pattern group associated with the target value is called pattern-target relation or pattern-target occurrence table. One realization of this relation is shown in Table 1.

In practice, we first scan the source and target blocks to have this occurrence table. We next filter every group to have the pattern-filter relation table as in Table 2. It is noted that this table can be prepared in advance. One typical table composed of erosion filters is shown in Table 2. Finally, we build a pattern-filter conflict table from the pattern-target relation (pattern-target occurrence table) and the pattern-filter relation table. Using this table, the least inconsistent filter is obtained. One example of the pattern-filter conflict table deduced from Table 1 and Table 2 is shown in Table 3. A schematics diagram to introduce the relation between the pattern and target pixel is illustrated in Fig. 2. It is noted that the conflict count is produced in a single scan of the block pairs in the source and target image frames to save time.

00000 | 0 | 65 | 10000 | 0 | 0 |

1 | 1 | 1 | 0 | ||

00001 | 0 | 1 | 10001 | 0 | 0 |

1 | 0 | 1 | 0 | ||

00010 | 0 | 1 | 10010 | 0 | 0 |

1 | 1 | 1 | 0 | ||

00011 | 0 | 2 | 10011 | 0 | 0 |

1 | 0 | 1 | 1 | ||

00100 | 0 | 0 | 10100 | 0 | 0 |

1 | 0 | 1 | 0 | ||

00101 | 0 | 0 | 10101 | 0 | 0 |

1 | 0 | 1 | 0 | ||

00110 | 0 | 1 | 10110 | 0 | 0 |

1 | 0 | 1 | 0 | ||

00111 | 0 | 0 | 10111 | 0 | 0 |

1 | 1 | 1 | 1 | ||

01000 | 0 | 10 | 11000 | 0 | 0 |

1 | 0 | 1 | 0 | ||

01001 | 0 | 2 | 11001 | 0 | 1 |

1 | 1 | 1 | 0 | ||

01010 | 0 | 0 | 11010 | 0 | 0 |

1 | 0 | 1 | 0 | ||

01011 | 0 | 0 | 11011 | 0 | 0 |

1 | 0 | 1 | 0 | ||

01100 | 0 | 0 | 11100 | 0 | 1 |

1 | 0 | 1 | 0 | ||

01101 | 0 | 3 | 11101 | 0 | 3 |

1 | 1 | 1 | 6 | ||

01110 | 0 | 0 | 11110 | 0 | 0 |

1 | 0 | 1 | 2 | ||

01111 | 0 | 0 | 11111 | 0 | 28 |

1 | 1 | 1 | 62 |

Filter Pattern | ||||

00000 | 0 | 0 | 0 | 0 |

00001 | 0 | 0 | 0 | 1 |

00010 | 0 | 0 | 0 | 1 |

00011 | 0 | 0 | 0 | 1 |

00100 | 0 | 0 | 0 | 0 |

00101 | 0 | 0 | 0 | 1 |

00110 | 0 | 0 | 0 | 1 |

00111 | 0 | 0 | 0 | 1 |

01000 | 0 | 0 | 0 | 0 |

01001 | 0 | 0 | 0 | 1 |

01010 | 0 | 0 | 0 | 1 |

01011 | 0 | 0 | 0 | 1 |

01100 | 0 | 0 | 0 | 0 |

01101 | 0 | 0 | 0 | 1 |

01110 | 0 | 0 | 0 | 1 |

01111 | 0 | 0 | 0 | 1 |

10000 | 0 | 0 | 0 | 0 |

10001 | 0 | 0 | 0 | 1 |

10010 | 0 | 0 | 0 | 1 |

10011 | 0 | 0 | 0 | 1 |

10100 | 0 | 0 | 0 | 0 |

10101 | 0 | 0 | 0 | 1 |

10110 | 0 | 0 | 0 | 1 |

10111 | 0 | 0 | 0 | 1 |

11000 | 0 | 0 | 0 | 0 |

11001 | 0 | 0 | 1 | 1 |

11010 | 0 | 0 | 0 | 1 |

11011 | 0 | 1 | 1 | 1 |

11100 | 0 | 0 | 0 | 0 |

11101 | 1 | 0 | 1 | 1 |

11110 | 1 | 1 | 1 | 1 |

11111 | 1 | 1 | 1 | 1 |

Filter Pattern | ||||

00000 | 1 | 1 | 1 | 1 |

00001 | 0 | 0 | 0 | 1 |

00010 | 1 | 1 | 1 | 1 |

00011 | 0 | 0 | 0 | 2 |

00100 | 0 | 0 | 0 | 0 |

00101 | 0 | 0 | 0 | 0 |

00110 | 0 | 0 | 0 | 1 |

00111 | 1 | 1 | 1 | 0 |

01000 | 0 | 0 | 0 | 0 |

01001 | 1 | 1 | 1 | 2 |

01010 | 0 | 0 | 0 | 0 |

01011 | 0 | 0 | 0 | 0 |

01100 | 0 | 0 | 0 | 0 |

01101 | 1 | 1 | 1 | 3 |

01110 | 0 | 0 | 0 | 0 |

01111 | 1 | 1 | 1 | 0 |

10000 | 0 | 0 | 0 | 0 |

10001 | 0 | 0 | 0 | 0 |

10010 | 0 | 0 | 0 | 0 |

10011 | 1 | 1 | 1 | 0 |

10100 | 0 | 0 | 0 | 0 |

10101 | 0 | 0 | 0 | 0 |

10110 | 0 | 0 | 0 | 0 |

10111 | 1 | 1 | 1 | 0 |

11000 | 0 | 0 | 0 | 0 |

11001 | 0 | 0 | 1 | 1 |

11010 | 0 | 0 | 0 | 0 |

11011 | 0 | 0 | 0 | 0 |

11100 | 0 | 0 | 0 | 0 |

11101 | 3 | 6 | 3 | 3 |

11110 | 0 | 0 | 0 | 0 |

11111 | 28 | 28 | 28 | 28 |

Total Conflict | 39 | 42 | 40 | 43 |

As an illustrating example, two 16*16 block obtained from Fig. 14(a) and Fig. 13(b) in the same location are used for the data in Table 1, 2, and 3. In the source block from Fig. 14(a), there are 66 occurrences of pattern 00000, while 65 of which are aimed to be 0 and 1 is aimed to be 1 according to the target block in Fig. 13(b) as shown in the first square in Table 1. Next, there are 32 selected filaters, each of which are composed of two erosion masks. The first filter 00000, composed of the masks 11110 and 11101, will filter the pattern 00000 to be the value 0 as shown in the first square in Table 2. Thus, there is 1 occurrence of pattern 00000 that will not favor the action of filter 00000 since this filter will change it to the value 0 (as in Table 2) but 1 of this pattern is targeted to 1 (as in Table 1). Consequently, the occurrence of conflict between the pattern 00000 and the filter 00000 is 1 as shown in the first square in Table 3.

## 7. Experimental results

The video streams of the “boat” are tested in our experiment. The original streams are of the CIF format with the gray levels of 256. They are first to be reduced to the size of 256*256, then threshold to be bi-level 256*256 sequences. Binary image processing is thus applied to the bi-level sequences in the encoding stage, which includes the motion vectors search and the optimal morphological filters determination. The block would be refreshed if the motion compensated error is above the threshold. Correspondingly, there are two possibilities in the decoding process: block refreshing or shape compensation after motion compensation.

For the purpose of comparison, two coding schemes are arranged. The first one is the conventional coding by motion compensation only. The second is coding with motion compensation followed by shape compensation. The frame errors of the three coding methods for the entire boat streams are plotted in Fig. 11. For visual quality demonstration, the first frame of the streams is shown with the forms of grey-leveled 256*256 in Fig. 12(a) and the form of bi-leveled are shown in the Fig. 12(b). Finally, the image samples of the decoded streams from coding one and two are illustrated in the Fig. 13 and Fig. 14 with being magnified to see the detail in Fig. 15.

## 8. Conclusions

Our coding procedures are simple: binary coding by motion compensation and shape compensation without using DCT coding. In the encoding stage, every motion compensated block has a shape compensation by a suitable morphological filter. This filter is selected on-line from a set of filters, which is selected off-line based on known statistics and experiences. The selection is by voting strategy. Decoding is simply a motion compensation followed by an efficient morphological filtering.

Visual quality for human is not concerned in this method as in the cases of telephony or conferences. In some situations such as the wild filed monitoring system, the decision function of security systems can be shifted to the concerned human if the video information can be provided inexpensively. For instance, the existence or the location of the intruder, which is the key information should be provided to the monitoring system. The low visual quality is tolerated with the convenient help of human decision-making as presented in this chapter.

## Acknowledgments

This research is partially supported by the National Science Council of the Republic of Chinaunder the contract NSC 99-2625-M-009-004-MY3