SlideShare a Scribd company logo
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
FINGERPRINT COMPRESSION BASED ON SPARSE REPRESENTATION 
ABSTRACT 
A new fingerprint compression algorithm based on sparse representation is 
introduced. Obtaining an over complete dictionary from a set of fingerprint 
patches allows us to represent them as a sparse linear combination of dictionary 
atoms. In the algorithm, we first construct a dictionary for predefined fingerprint 
image patches. For a new given fingerprint images, represent its patches 
according to the dictionary by computing l0-minimization and then quantize and 
encode the representation. In this paper, we consider the effect of various factors 
on compression results. Three groups of fingerprint images are tested. The 
experiments demonstrate that our algorithm is efficient compared with several 
competing compression techniques (JPEG, JPEG 2000, and WSQ), especially at 
high compression ratios.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
SCOPE OF WORK 
Recognition of persons by means of biometric characteristics is an important 
technology in the society, because biometric identifiers can’t be shared and they 
intrinsically represent the individual’s bodily identity. Among many biometric 
recognition technologies, fingerprint recognition is very popular for personal 
identification due to the uniqueness, universality, collectability and invariance. 
Large volumes of fingerprint are collected and stored every day in a wide range of 
applications, including forensics and access control. 
PROBLEM DEFINITION 
In 1995, the size of the FBI fingerprint card archive contained over 200 million 
items and archive size was increasing at the rate of 30 000 to 50 000 new cards 
per day. Large volume of data consume the amount of memory. Fingerprint image 
compression is a key technique to solve the problem. 
PROPOSED SOLUTION 
Compression technologies can be classed into lossless and lossy. Lossless 
compression allows the exact original images to be reconstructed from the
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
compressed data. Lossless compression technologies are used in cases where it is 
important that the original and the decompressed data are identical. Avoiding 
distortion limits their compression efficiency. When used in image compression 
where slight distortion is acceptable, lossless compression technologies are often 
employed in the output coefficients of lossy compression. Lossy compression 
technologies usually transform an image into another domain, quantize and 
encode its coefficients. 
EXISTING SYSTEM 
Compression technologies can be classed 
 Lossless and 
 Lossy 
Lossless compression 
This allows the exact original images to be reconstructed from the compressed 
data. 
Lossy compression 
Transform an image into another domain, quantize and encode its coefficients. 
Transform-based image compression technologies
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
Transform-based image compression technologies have been extensively 
researched and some standards have appeared. 
 Discrete Cosine Transform (DCT) and 
 Discrete Wavelet Transform (DWT) 
Discrete Cosine Transform 
The DCT-based encoder can be thought of as compression of a stream of 8 × 8 
small block of images. This transform has been adopted in JPEG. The JPEG 
compression scheme has many advantages such as simplicity, universality and 
availability. 
Disadvantages 
However, it has a bad performance at low bit-rates mainly because of the 
underlying block-based DCT scheme. 
Discrete Wavelet Transform 
The DWT-based algorithms include three steps: a DWT computation of the 
normalized image, quantization of the DWT coefficients and lossless coding of the 
quantized coefficients. There are several other DWT-based algorithms, such as Set 
Partitioning in Hierarchical Trees (SPIHT) Algorithm. These algorithms are for 
general image compression.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
Wavelet Scalar Quantization 
Targeted at fingerprint images, these are special algorithms Wavelet Scalar 
Quantization (WSQ). It became the FBI standard for the compression of 500 dpi 
fingerprint images. 
There are other algorithms for fingerprint compression, such as Contourlet 
Transform (CT). These algorithms have a common shortcoming, namely, without 
the ability of learning. The fingerprint images can’t be compressed well now. They 
will not be compressed well later. 
Disadvantages 
DCT has a bad performance at low bit-rates mainly because of the underlying 
block-based DCT scheme. 
PROPOSED SYSTEM 
 A novel approach based on sparse representation is proposed. 
 To construct a base matrix whose columns represent features of the 
fingerprint images, referring the matrix dictionary whose columns are 
called atoms 
 For a given whole fingerprint, divide it into small blocks called patches 
whose number of pixels are equal to the dimension of the atoms
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
 To use the method of sparse representation to obtain the coefficients; 
then, quantize the coefficients; last, encode the coefficients and other 
related information using lossless coding methods. 
Advantages 
 Good compression ration 
 Lossless image compression is achieved 
Hardware requirements: 
Processor : Any Processor above 500 MHz. 
Ram : 128Mb. 
Hard Disk : 10 Gb. 
Compact Disk : 650 Mb. 
Input device : Standard Keyboard and Mouse. 
Output device : VGA and High Resolution Monitor. 
Software requirements: 
Operating System : Windows Family. 
Language : JDK 1.5

More Related Content

PPT
Applying Deep Learning with Weak and Noisy labels
PDF
A spatial image compression algorithm based on run length encoding
PDF
Iaetsd performance analysis of discrete cosine
DOCX
A DCT-BASED TOTAL JND PROFILE FORSPATIO-TEMPORAL AND FOVEATED MASKING EFFECTS
PDF
A Novel Approach to Image Denoising and Image in Painting
PDF
Developing and comparing an encoding system using vector quantization &
PDF
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
DOCX
Ieee 2015 16 matlab @dreamweb techno solutions-trichy
Applying Deep Learning with Weak and Noisy labels
A spatial image compression algorithm based on run length encoding
Iaetsd performance analysis of discrete cosine
A DCT-BASED TOTAL JND PROFILE FORSPATIO-TEMPORAL AND FOVEATED MASKING EFFECTS
A Novel Approach to Image Denoising and Image in Painting
Developing and comparing an encoding system using vector quantization &
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Ieee 2015 16 matlab @dreamweb techno solutions-trichy

What's hot (14)

PDF
MULTI-LEVEL FEATURE FUSION BASED TRANSFER LEARNING FOR PERSON RE-IDENTIFICATION
PDF
IRJET- Generating 3D Models Using 3D Generative Adversarial Network
PDF
Geometric Deep Learning
PDF
A new image steganography algorithm based
PDF
Performance analysis on color image mosaicing techniques on FPGA
PDF
An effective and robust technique for the binarization of degraded document i...
PDF
IRJET- A Study of Generative Adversarial Networks in 3D Modelling
PDF
Development of a Location Invariant Crack Detection and Localisation Model (L...
PDF
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
PDF
TEXTURE CLASSIFICATION USING DENSE MICRO-BLOCK DIFFERENCE (DMD)
PDF
2018AOI論壇_深度學習於表面瑕疪檢測_元智大學蔡篤銘
PDF
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
PDF
PDF
Paper Explained: One Pixel Attack for Fooling Deep Neural Networks
MULTI-LEVEL FEATURE FUSION BASED TRANSFER LEARNING FOR PERSON RE-IDENTIFICATION
IRJET- Generating 3D Models Using 3D Generative Adversarial Network
Geometric Deep Learning
A new image steganography algorithm based
Performance analysis on color image mosaicing techniques on FPGA
An effective and robust technique for the binarization of degraded document i...
IRJET- A Study of Generative Adversarial Networks in 3D Modelling
Development of a Location Invariant Crack Detection and Localisation Model (L...
Image Watermarking in Spatial Domain Using QIM and Genetic Algorithm
TEXTURE CLASSIFICATION USING DENSE MICRO-BLOCK DIFFERENCE (DMD)
2018AOI論壇_深度學習於表面瑕疪檢測_元智大學蔡篤銘
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Paper Explained: One Pixel Attack for Fooling Deep Neural Networks
Ad

Viewers also liked (16)

PPT
Fingerprints
PDF
Learning Sparse Representation
PPT
Methods Of Fingerprinting: Chris Strein
PPT
Fingerprinting
PPT
Fingerprints
PPTX
Social Media 101 for the Church
DOCX
Bandwidth distributed denial of service attacks and defenses
PPTX
Steve jobs
PPTX
κώστας
PDF
My love
PPSX
Light and shade
PDF
A fast fault tolerant architecture for sauvola local image thresholding algor...
PDF
บทความเชียงใหม่สัตวเเพทยสาร ปีที่ ๑๑ ฉบับที่ ๑ พ.ศ. ๒๕๕๖
PPTX
How to Get Involved in the Magento Community #mm16ar
PPTX
Muscle pharm bullet proof
PPTX
Solar Panels
Fingerprints
Learning Sparse Representation
Methods Of Fingerprinting: Chris Strein
Fingerprinting
Fingerprints
Social Media 101 for the Church
Bandwidth distributed denial of service attacks and defenses
Steve jobs
κώστας
My love
Light and shade
A fast fault tolerant architecture for sauvola local image thresholding algor...
บทความเชียงใหม่สัตวเเพทยสาร ปีที่ ๑๑ ฉบับที่ ๑ พ.ศ. ๒๕๕๖
How to Get Involved in the Magento Community #mm16ar
Muscle pharm bullet proof
Solar Panels
Ad

Similar to Fingerprint compression based on sparse representation (20)

DOCX
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
PDF
K-SVD: ALGORITHM FOR FINGERPRINT COMPRESSION BASED ON SPARSE REPRESENTATION
PDF
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
PDF
Comparison of different Fingerprint Compression Techniques
PPT
MTech Dissertation.ppt
PDF
G0352039045
PDF
A Comparative Study of Image Compression Algorithms
PDF
Dictionary based Image Compression via Sparse Representation
PDF
A Review on Image Compression using DCT and DWT
PDF
Compression technique using dct fractal compression
PDF
11.compression technique using dct fractal compression
PDF
dFuse: An Optimized Compression Algorithm for DICOM-Format Image Archive
PDF
Quality Prediction in Fingerprint Compression
PDF
Efficient Image Compression Technique using Clustering and Random Permutation
PDF
Efficient Image Compression Technique using Clustering and Random Permutation
PDF
Image Compression Through Combination Advantages From Existing Techniques
DOCX
Designing an efficient image encryption then-compression system via predictio...
PDF
An approach for color image compression of bmp and tiff images using dct and dwt
PDF
Bg044357364
PDF
40120140505005
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Fingerprint compression-based-on-...
K-SVD: ALGORITHM FOR FINGERPRINT COMPRESSION BASED ON SPARSE REPRESENTATION
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Comparison of different Fingerprint Compression Techniques
MTech Dissertation.ppt
G0352039045
A Comparative Study of Image Compression Algorithms
Dictionary based Image Compression via Sparse Representation
A Review on Image Compression using DCT and DWT
Compression technique using dct fractal compression
11.compression technique using dct fractal compression
dFuse: An Optimized Compression Algorithm for DICOM-Format Image Archive
Quality Prediction in Fingerprint Compression
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
Image Compression Through Combination Advantages From Existing Techniques
Designing an efficient image encryption then-compression system via predictio...
An approach for color image compression of bmp and tiff images using dct and dwt
Bg044357364
40120140505005

More from LeMeniz Infotech (20)

PDF
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
PDF
A dynamically reconfigurable multi asip architecture for multistandard and mu...
PDF
Interleaved digital power factor correction based on the sliding mode approach
PDF
Bumpless control for reduced thd in power factor correction circuits
PDF
A bidirectional single stage three phase rectifier with high-frequency isolat...
PDF
A bidirectional three level llc resonant converter with pwam control
PDF
Efficient single phase transformerless inverter for grid tied pvg system with...
PDF
Highly reliable transformerless photovoltaic inverters with leakage current a...
PDF
Grid current-feedback active damping for lcl resonance in grid-connected volt...
PDF
Delay dependent stability of single-loop controlled grid-connected inverters ...
PDF
Connection of converters to a low and medium power dc network using an induct...
PDF
Stamp enabling privacy preserving location proofs for mobile users
PDF
Sbvlc secure barcode based visible light communication for smartphones
PDF
Read2 me a cloud based reading aid for the visually impaired
PDF
Privacy preserving location sharing services for social networks
PDF
Pass byo bring your own picture for securing graphical passwords
PDF
Eplq efficient privacy preserving location-based query over outsourced encryp...
PDF
Analyzing ad library updates in android apps
PDF
An exploration of geographic authentication scheme
PDF
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
Interleaved digital power factor correction based on the sliding mode approach
Bumpless control for reduced thd in power factor correction circuits
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional three level llc resonant converter with pwam control
Efficient single phase transformerless inverter for grid tied pvg system with...
Highly reliable transformerless photovoltaic inverters with leakage current a...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Delay dependent stability of single-loop controlled grid-connected inverters ...
Connection of converters to a low and medium power dc network using an induct...
Stamp enabling privacy preserving location proofs for mobile users
Sbvlc secure barcode based visible light communication for smartphones
Read2 me a cloud based reading aid for the visually impaired
Privacy preserving location sharing services for social networks
Pass byo bring your own picture for securing graphical passwords
Eplq efficient privacy preserving location-based query over outsourced encryp...
Analyzing ad library updates in android apps
An exploration of geographic authentication scheme
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Cloud computing and distributed systems.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
Teaching material agriculture food technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Reach Out and Touch Someone: Haptics and Empathic Computing
Unlocking AI with Model Context Protocol (MCP)
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation_ Review paper, used for researhc scholars
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
cuic standard and advanced reporting.pdf
Review of recent advances in non-invasive hemoglobin estimation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine learning based COVID-19 study performance prediction
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Teaching material agriculture food technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The AUB Centre for AI in Media Proposal.docx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Fingerprint compression based on sparse representation

  • 1. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts FINGERPRINT COMPRESSION BASED ON SPARSE REPRESENTATION ABSTRACT A new fingerprint compression algorithm based on sparse representation is introduced. Obtaining an over complete dictionary from a set of fingerprint patches allows us to represent them as a sparse linear combination of dictionary atoms. In the algorithm, we first construct a dictionary for predefined fingerprint image patches. For a new given fingerprint images, represent its patches according to the dictionary by computing l0-minimization and then quantize and encode the representation. In this paper, we consider the effect of various factors on compression results. Three groups of fingerprint images are tested. The experiments demonstrate that our algorithm is efficient compared with several competing compression techniques (JPEG, JPEG 2000, and WSQ), especially at high compression ratios.
  • 2. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts SCOPE OF WORK Recognition of persons by means of biometric characteristics is an important technology in the society, because biometric identifiers can’t be shared and they intrinsically represent the individual’s bodily identity. Among many biometric recognition technologies, fingerprint recognition is very popular for personal identification due to the uniqueness, universality, collectability and invariance. Large volumes of fingerprint are collected and stored every day in a wide range of applications, including forensics and access control. PROBLEM DEFINITION In 1995, the size of the FBI fingerprint card archive contained over 200 million items and archive size was increasing at the rate of 30 000 to 50 000 new cards per day. Large volume of data consume the amount of memory. Fingerprint image compression is a key technique to solve the problem. PROPOSED SOLUTION Compression technologies can be classed into lossless and lossy. Lossless compression allows the exact original images to be reconstructed from the
  • 3. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts compressed data. Lossless compression technologies are used in cases where it is important that the original and the decompressed data are identical. Avoiding distortion limits their compression efficiency. When used in image compression where slight distortion is acceptable, lossless compression technologies are often employed in the output coefficients of lossy compression. Lossy compression technologies usually transform an image into another domain, quantize and encode its coefficients. EXISTING SYSTEM Compression technologies can be classed  Lossless and  Lossy Lossless compression This allows the exact original images to be reconstructed from the compressed data. Lossy compression Transform an image into another domain, quantize and encode its coefficients. Transform-based image compression technologies
  • 4. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts Transform-based image compression technologies have been extensively researched and some standards have appeared.  Discrete Cosine Transform (DCT) and  Discrete Wavelet Transform (DWT) Discrete Cosine Transform The DCT-based encoder can be thought of as compression of a stream of 8 × 8 small block of images. This transform has been adopted in JPEG. The JPEG compression scheme has many advantages such as simplicity, universality and availability. Disadvantages However, it has a bad performance at low bit-rates mainly because of the underlying block-based DCT scheme. Discrete Wavelet Transform The DWT-based algorithms include three steps: a DWT computation of the normalized image, quantization of the DWT coefficients and lossless coding of the quantized coefficients. There are several other DWT-based algorithms, such as Set Partitioning in Hierarchical Trees (SPIHT) Algorithm. These algorithms are for general image compression.
  • 5. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts Wavelet Scalar Quantization Targeted at fingerprint images, these are special algorithms Wavelet Scalar Quantization (WSQ). It became the FBI standard for the compression of 500 dpi fingerprint images. There are other algorithms for fingerprint compression, such as Contourlet Transform (CT). These algorithms have a common shortcoming, namely, without the ability of learning. The fingerprint images can’t be compressed well now. They will not be compressed well later. Disadvantages DCT has a bad performance at low bit-rates mainly because of the underlying block-based DCT scheme. PROPOSED SYSTEM  A novel approach based on sparse representation is proposed.  To construct a base matrix whose columns represent features of the fingerprint images, referring the matrix dictionary whose columns are called atoms  For a given whole fingerprint, divide it into small blocks called patches whose number of pixels are equal to the dimension of the atoms
  • 6. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts  To use the method of sparse representation to obtain the coefficients; then, quantize the coefficients; last, encode the coefficients and other related information using lossless coding methods. Advantages  Good compression ration  Lossless image compression is achieved Hardware requirements: Processor : Any Processor above 500 MHz. Ram : 128Mb. Hard Disk : 10 Gb. Compact Disk : 650 Mb. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor. Software requirements: Operating System : Windows Family. Language : JDK 1.5