Next Article in Journal
Self-Powered and Autonomous Vibrational Wake-Up System Based on Triboelectric Nanogenerators and MEMS Switch
Next Article in Special Issue
Performance Portrait Method: An Intelligent PID Controller Design Based on a Database of Relevant Systems Behaviors
Previous Article in Journal
Computational Thinking and Educational Robotics Integrated into Project-Based Learning
Previous Article in Special Issue
An Experimental Safety Response Mechanism for an Autonomous Moving Robot in a Smart Manufacturing Environment Using Q-Learning Algorithm and Speech Recognition
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Digital Image Representation by Atomic Functions: The Compression and Protection of Data for Edge Computing in IoT Systems

by
Viktor Makarichev
1,
Vladimir Lukin
2,
Oleg Illiashenko
1,* and
Vyacheslav Kharchenko
1
1
Department of Computer Systems, Networks and Cybersecurity, National Aerospace University “KhAI”, 17, Chkalov Str., 61070 Kharkiv, Ukraine
2
Department of Information-Communication Technologies, National Aerospace University “KhAI”, 17, Chkalov Str., 61070 Kharkiv, Ukraine
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(10), 3751; https://doi.org/10.3390/s22103751
Submission received: 17 April 2022 / Revised: 7 May 2022 / Accepted: 12 May 2022 / Published: 14 May 2022
(This article belongs to the Special Issue Intelligent Control and Digital Twins for Industry 4.0)

Abstract

:
Digital images are used in various technological, financial, economic, and social processes. Huge datasets of high-resolution images require protected storage and low resource-intensive processing, especially when applying edge computing (EC) for designing Internet of Things (IoT) systems for industrial domains such as autonomous transport systems. For this reason, the problem of the development of image representation, which provides compression and protection features in combination with the ability to perform low complexity analysis, is relevant for EC-based systems. Security and privacy issues are important for image processing considering IoT and cloud architectures as well. To solve this problem, we propose to apply discrete atomic transform (DAT) that is based on a special class of atomic functions generalizing the well-known up-function of V.A. Rvachev. A lossless image compression algorithm based on DAT is developed, and its performance is studied for different structures of DAT. This algorithm, which combines low computational complexity, efficient lossless compression, and reliable protection features with convenient image representation, is the main contribution of the paper. It is shown that a sufficient reduction of memory expenses can be obtained. Additionally, a dependence of compression efficiency measured by compression ratio (CR) on the structure of DAT applied is investigated. It is established that the variation of DAT structure produces a minor variation of CR. A possibility to apply this feature to data protection and security assurance is grounded and discussed. In addition, a structure or file for storing the compressed and protected data is proposed, and its properties are considered. Multi-level structure for the application of atomic functions in image processing and protection for EC in IoT systems is suggested and analyzed.

1. Introduction

1.1. Motivation

Nowadays, digital data are an integral part of human life. Data are used in various technological, financial, economic, and social processes. Moreover, data are a base of particular sectors of industry; they also provide the emergence and explosive development of new ones.
Digital images have a special place among data. They are a key object of research and analysis of such directions as digital signal and image processing [1], computer vision [2], machine learning [3], etc. The results obtained are widely applied in security systems for smart homes [4] and environment monitoring systems [5], autonomous control [6], robotics [7], and so on. A separate important issue is the efficiency improvement of image generation, processing, and transmission in the context of implementing Internet of Things (IoT) systems in industry and human domains [8].
Technology development has already provided and continues to produce a lot of high-resolution digital images. For instance, using modern sensors, remote sensing digital images of a very high resolution can be acquired [9]. Smartphones are another example. They provide more than 1 trillion digital photos every year [10]. A lot of image databases have been collected. The main examples are the SICAS Medical Image Repository [11], the European Space Agency “Sentinel-2” database [12], and the computer vision dataset “CelebA” [13].
For this reason, the problem of reducing the resources required for image processing, storage, and transferring via networks is of particular interest. This aspect of image processing is complemented by several circumstances that are more important.
Firstly, for many applications, it is required to ensure data privacy, integrity, and confidentiality in parallel with their compression, transmission, and processing [14,15]. Data protection during image processing is carried out, as a rule, using standard additional software and hardware without considering the particularities of the compression and processing processes themselves. It would be great to ensure data protection by embedding security-related procedures into imaging processes [16,17].
Secondly, image processing and compression should be, as a rule, performed at the lower levels of the system hierarchy that can be associated with dew and fog computing [18,19]. The concept of edge computing (EC) has become one of the most constructive and attractive due to the ability to offload traffic and make more powerful and intelligent means (hardware and software) that are placed near data sources in IoT systems [18,19]. The importance of aspects of the application of edge computing in data processing engineering is confirmed in [20].
Nowadays, the market for autonomous vehicles consists primarily of unmanned military drones. Current research shows that by 2023 it will transform into one that is 60 percent civilian, including ground, sea, air, and space transportation and expand to 636 billion euros, more than 40 times its current size. According to the industrial and researchers’ calculations, autonomous vehicles will make up to 20 percent of the total vehicle market by 2030, and three out of four of them will be used as ground transportation [21,22].
Cybersecurity ensuring the autonomous transportation systems of all types is extremely important since its secureness influences the safety of people (e.g., in an urban area, suburbs, etc.) and the environment. In particular, cybersecurity should be provided as far as autonomous vehicles should transmit (store and handle) data between each other, thus being the part of constantly changing computing systems of the Internet of Things, considering the massive amount of data which should be transmitted over this flexible Internet of autonomous vehicles such as UAVs and specific vulnerabilities of protocols and IoT systems [23,24].
A promising way to cope with providing the cybersecurity of the autonomous transportation (mobility) systems of different types could be the application of ideas and methods of machine learning (ML) and artificial intelligence (AI) as well. In this case, the trustworthiness of the implemented algorithms of cybersecurity ensuring which are executed by autonomous vehicles of all types (ground, sea, air, and space transportation) should be of the highest level and depend mainly on the functional efficiency of ML and AI technologies applied to the on-board system of the particular autonomous vehicle and its communications (and probably stationary systems of traffic control/control rooms in case of urban area).
The potential cybersecurity risks connected to the AI and ML components are in charge of replicating tasks previously addressed by human drivers (e.g., making sense of the environment or making decisions on the behaviors of the vehicle) [23,24]. AI components do not obey the same rules as traditional software (ML techniques indeed rely on implicit rules that are grounded on the statistical analysis of large collections of data, thus enabling automation to reach unprecedented cognitive capabilities). Thus, it opens at the same time new opportunities for malicious actors, who can exploit the high complexity of AI systems to their advantage by using AI cognitive differences in decision-making compared to human beings.
Thus, there is a need to develop edge computing-based engineering for secure image processing and compression engineering by use of novel approaches and algorithms which could assure synergetic effect in practical implementation useful for both academia and industry sectors.

1.2. State of the Art and Objectives

A large number of image formats have been developed. Many of them, in particular, BMP, PNG, and JPEG, are widely used. Moreover, some of them are de-facto standards for special type images. For instance, JPEG is still the main standard for digital photos. Particular attention was paid to the solution of the problem of reducing memory costs in recent years [25]. A lot of image compression algorithms, which became the base of the corresponding graphic formats, have been developed and studied [26]. Nevertheless, not all of them are widely used and supported by software applications, in particular Internet browsers. An example is JPEG2000, which was developed to replace JPEG. Perhaps, one of the reasons is the fear of IT companies violating patent restrictions. Even though many patents have expired, it cannot be argued that currently, there is a trend toward the use of this algorithm. Potentially, an absence of some algorithm wide support by the community of developers and practitioners can be explained by the complexity of standards that results in the development of new technologies, which have simple program implementations and, hence, are easy to support (see, for example, the algorithm QOI [27]).
An important trend in recent decades is the explosive hardware development, creation, and wide use of smartphones and tablet PCs [28]. There is also a decrease in price and an increase in the performance of data storage devices, as well as the development of new storing technologies. Moreover, an improvement of telecommunication systems provides a wide usage of cloud storage services, for example, Google Drive, One Drive, Dropbox, etc. All of these have led to a shift in interest of the scientific community in other directions, especially toward artificial intelligence and machine learning. In addition, a huge increase in computing power allows the rapid development and practical implementation of projects that were previously considered to be related to the far future and even science fiction. The examples are different systems and services based on artificial networks [29].
The reverse side of the great development of technologies is an explosive increase in data volumes [30]. Furthermore, cyber threats and hacker activity have increased significantly, leading to dramatic damage [31]. Additionally, the risks of using personal data for criminal purposes have grown [32]. Therefore, the development of methods, which can solve the problem of protected data storage, is of particular importance. An important driver is also a necessity to satisfy some special regulatory restrictions concerning personal data (for instance, General Data Protection Regulation in the European Union [33]). One of the solutions to this problem is the application of encryption [34] and compression algorithms [25,26]. Data can be compressed and, after that, encrypted. However, this requires huge additional resources, especially when processing big data. Another way is to apply compression to data that is already encrypted. However, such an approach greatly restricts the range of applicable compression algorithms and affects their efficiency [26].
Further, since, in many cases, image recognition is resource-intensive, one of its development trends is in the reduction of complexity, especially when applying deep learning approaches [35,36]. Additionally, a satisfaction of green technologies principles and requirements [37] should be provided to reduce energy costs and, as a result, CO2 emission, as well as thermal pollution of the environment. One possible solution is to create and apply such a data representation, which would be ready for the direct application of recognition algorithms.
Therefore, the problem of developing an image representation, which provides compression and protection in combination with the possibility of direct application of recognition, retrieval, and classification algorithms, is of particular importance. The relevance of this problem is also confirmed by IT industry trends analysis, in particular, in the area of data storing [38,39] and protection [40,41]. Concerning digital images, trends such as complexity reduction, especially when applying deep learning techniques for image analysis and recognition, should be noted [19,20]. All of these take on special significance when applying edge computing (EC) approaches in the Internet of things (IoT) systems [18,42]. Indeed, modern mobile devices such as smartphones and tablet computers provide digital photos of a very high resolution. Further operating these data in EC-powered artificial intelligence systems, i.e., AIoT [20,43], as well as distributed machine learning (ML) systems in EC [44], requires huge traffic and computational resources. Additionally, it provides such issues as power waste, latency, etc. Furthermore, appropriate security and privacy protection must be ensured [45].
In the current paper, the possibility of solving this problem using atomic functions [46,47] is considered. Atomic functions were introduced in the early 1970s of the 20th century. The main reason for their development was a combination of necessity to solve numerically different applied problems with poor computational capabilities. This provided a search for constructive tools that were an alternative to algebraic and trigonometric polynomials. In this paper, atomic functions,
u p s ( x ) = 1 2 π e i t x k = 1 s i n 2 ( s t ( 2 s ) k ) s 2 t ( 2 s ) k s i n ( t ( 2 s ) k ) d t ,
are used. A particularly important case of these functions is u p 1 ( x ) which is a well-known up-function of V.A. Rvachev [46]. Atomic functions u p s ( x ) have several useful features, which are important in the context of the problem stated above. Indeed, they have good approximation properties and provide fast data decomposition [46,47]. Their application to the development of image representation, which combines the features described, is promising. Moreover, the exact values of u p s ( x ) can be computed using fast dynamic algorithms [48].
The main contribution of this work is a lossless image processing algorithm based on atomic functions u p s ( x ) that has low time complexity and provides a combination of compression, data protection, as well as image representation, which can be used in recognition, classification, retrieval, and other artificial intelligence technologies directly without preprocessing steps. A novelty is an ability to vary a structure of discrete transform, which is based on u p s ( x ) and constitutes a core of the algorithm considered, without significant impact on the efficiency measured by the compression ratio that is a classic performance indicator [26]. In Table 1, the related references are presented, and their features are discussed. In contrast to the works presented, a combination of image compression, protection, and convenient data representation is the focus of the current research.
This paper is organized as follows. First, the formulation of the problem and an approach to the current research are introduced. Second, a solution and algorithms of digital image compression based on atomic functions are presented. Next, efficiency research is carried out, and possible edge computing-based applications and possibilities for data protection are discussed. Finally, conclusions follow.

2. Formulation of the Problem and an Approach

In the current research, we consider raster digital images. This type of data can be considered a two-dimensional matrix [1]. Generally, the problem is to develop such a transformation of an image matrix that provides its further efficient compression, protection, and representation, which is convenient for recognition. Different ways to apply atomic functions (1) are discussed in [47]. It was shown that atomic wavelets, constructed using u p s ( x ) , are the most appropriate tool for discrete data processing, in particular, matrices. These functions are applied in discrete atomic compression (DAC) of digital images [49]. The algorithm DAC belongs to the class of lossy compression algorithms [26].
Figure 1 show the structure of DAC. Discrete atomic transform (DAT), which is the wavelet transform based on atomic functions u p s ( x ) , constitutes a core of the DAC algorithm. In [47], it was proved that DAT has linear time complexity, i.e., T D A T ( N ) = O ( N ) , where N is the size of the data processed (in the case of matrix processing, N is a number of pixels). Moreover, it requires insignificant additional memory overhead. Furthermore, since spaces of atomic functions u p s ( x ) are asymptotically extremal for the approximation of differentiable functions, i.e., these functions have good approximation properties, the DAT provides a representation of the image by a set of DAT coefficients, most of which are small-valued.
In other words, a digital image can be described well using just a small number of DAT coefficients that, in addition, can be found using low-complexity computations. For this reason, the DAT can be considered a procedure for dimension reduction, and image description by DAT coefficients is the representation that is convenient for further image analysis. This is similar to using the discrete cosine transform (DCT) [29]. An important advantage of DAT compared to DCT is computational complexity. Indeed, in general, the time complexity of DCT is T D C T ( N ) = O ( N 2 ) ; although, in many practical cases, fast algorithms provide O ( N l o g l o g   N   ) [50].
Next, by construction, DAT coefficients are real numbers and, in general, non-integers. At the same time, in most cases, elements of the mage matrix are integers. For instance, each element of matrices of 24-bit full-color digital images has three components: red, green, and blue, each of which is an integer from the range 0, 1, …, 255 [1]. To provide data compressing, quantization of DAT coefficients and further encoding using lossless compression methods are applied in DAC (see Figure 1) [49].
It is quantizing that makes this algorithm lossy, i.e., a decompressed image does not match the corresponding source. Nevertheless, the quality loss control mechanism, which ensures the desired loss of quality measured by maximum absolute deviation (MAD), root mean square error (RMSE), and/or peak signal-to-noise ratio (PSNR), was recently developed, and the modes of DAC, which can produce compressed images without visual distortions, were obtained [49]. Furthermore, it was shown that variation of the DAT structure provides a minor variation of DAC efficiency indicators. This feature of the DAC algorithm provides high-level protection for the digital images processed [49].
Hence, the DAT-based approach, which is used in DAC, is a way to develop such image representation that provides its compression and protection in combination with the convenience of further analysis, in particular, recognition, classification, retrieval, etc.
However, the following problem arises. When processing, for example, digital photos, some loss of quality without visual distortions can be considered acceptable. At the same time, even visually lossless compression can be unacceptable in some cases. For instance, when compressing medical data or images, which are supposed to be used as evidence, the changes may lead to incorrect results of analysis [2]. The current paper aims to answer the following question: is it possible to modify the algorithm DAC to provide a lossless compression of digital images? To answer this question, the following tasks are solved step by step:
  • First, to develop an extension of lossy DAC that allows reconstruction of the image compressed without any distortions;
  • Second, to investigate features of the constructed lossless image compression algorithm and determine parameters that affect its effectiveness;
  • Third, to find such parameters of lossless DAC that provide its best performance in terms of image compression.

3. DAC Based Solutions

In this section, lossless discrete atomic compression of digital images is proposed, and its basic features are discussed.

3.1. Lossless DAC

The DAC algorithm (Figure 1) is constructed using the following approach, which is also applied in JPEG, JPEG2000, and other image compression algorithms [25,26]: preprocessing → discrete data transform → quantization → encoding. There are several ways to modify this classic scheme to obtain lossless compression. First, reversible procedures that provide exact source data reconstruction can be used at each processing step. However, it requires significant changes. For instance, in the algorithm JPEG2000, the lossless mode uses discrete wavelet and color space transforms that differ from the corresponding procedures of the lossy (conventional) one [25,26]. Such an approach can be implemented in DAC. In this case, the DAT should be modified or even replaced, which can result in a decrease in the compression efficiency of the method and its data protection features. Additionally, this makes the software implementation of DAC more complicated and, hence, more difficult to support.
Another way is to supplement the already existing version of DAC with additional steps that provide an absence of quality loss. The following idea seems to be one of the most simple and suitable methods to implement this. Let A be a matrix of a source image. Denote by B a matrix of the image that is reconstructed after compression by DAC. In general, these matrices are not identical. Consider a matrix C = A − B. It is suggested to compress this matrix using lossless methods and add the obtained data to the file that is provided by lossy DAC (Figure 2).
Thus, an extended DAC file, i.e., the file with a compressed image, consists of three main parts: a header, which contains, in particular, information about image size and parameters of lossy compression; a “lossy” part that contains compressed quantized DAT coefficients (actually, the data that provide the matrix B); the “extension” that provides the matrix C. It is clear that such an approach requires a modification of the DAC algorithm. Lossless image compression by DAC is shown in Figure 3. It can be seen that it consists of a lossy compression step, computation of difference matrix, and appending the “lossy” part with its encoded values.
At the first step of the presented algorithm, the RGB-to-YCrCb conversion is applied to the matrix of RGB components (A) of an image to be compressed. This step provides matrices Y, Cr, and Cb of luma and chroma components, respectively.
Then, the DAT procedure is applied to each of them, and three matrices of DAT coefficients are computed. After that, the values of the matrices obtained are quantized and encoded. This provides the “main data” of the extended DAC file (see Figure 2).
To obtain the “extension” part of the DAC file, inverse steps are used: elements of the matrices of quantized DAT coefficients are dequantized; then, inverse DAT and YCrCb-to-RGB conversion are applied, and the RGB matrix (B) of the reconstructed image is obtained. The difference matrix C = AB is computed, and its values are encoded.
We stress that each of the steps applied has a time complexity that is linear concerning the number of the image pixels. Consider the encoding of values of matrix C in more detail.
To encode the matrix C, which defines a difference between the source image (A) and its “lossy” version (B), it is proposed to apply the same method that is used for lossless compression of quantized DAT coefficients, i.e., a combination of binary arithmetic coding with Golomb codes [49]. Elements of C are integers and are assigned to the bitstream using the following rule: zero elements are assigned to 0; each positive value c i j is assigned to the code
11 1 0 2 k 1
where k = c i j ; and, finally, each negative value c i j is assigned to the code
11 1 0 2 k
where k = c i j . After that, the bitstream obtained is compressed using binary arithmetic coding [26].
The proposed approach to lossless compression is based on several assumptions. First, it is assumed that the CR of lossy compression is quite large (let us say, at least larger than 2). Second, it is supposed that the CR for matrix C is quite large as well (sufficiently larger than unity) because the values of C are represented by a limited number of small integers. Then, one can expect that the aggregate CR can be essentially larger than unity. Furthermore, it is possible to assume that if the CR compressing for B increases, the CR for C decreases; thus, it should be some optimum.
In Figure 4, the decompression process is provided. It is obvious that the source image is reconstructed exactly. Indeed, the decompression procedure consists of three steps. The first and the second ones provide the matrices B and C, respectively. After that, these matrices are added, and A = B + C, which is a matrix of the original image, is computed. Using a part of the DAC file, which contains the “main data” (see Figure 2), matrix B is obtained. For this purpose, the decoding procedure is used, and matrices of quantized DAT coefficients are obtained. Then, inverse DAT and YCrCb-to-RGB conversion are applied, and matrix B is computed. After that, decoding of the rest of the DAC file, i.e., an “extension” part (see Figure 2), provides matrix C. By summing up this matrix with B, the digital image, which coincides with the source one, is obtained. Thus, the proposed image compression algorithm is lossless.
Further, features of the proposed modification of the algorithm DAC are considered, and its efficiency is investigated.

3.2. Features of Lossless DAC

In the proposed lossless DAC, the lossy DAC part, which consists of DAT, coefficient quantizing, and encoding, remains unchanged. Therefore, the possibility of varying the structure of DAT, which is important for data protection, also remains unchanged. Consider this possibility in more detail.
DAT is based on atomic wavelets that provide a decomposition of data given by an array into orthogonal components (see Figure 5). The number of orthogonal layers obtained is called a depth of transform [47]. Depending on how one-dimensional DAT is applied to blocks of a matrix, results of the different structures are obtained. In Figure 6, the matrix transform, which is denoted by DAT1, is shown. It is constructed as follows: first, the one-dimensional procedure DAT of the depth n is applied to each row of the given matrix; then, it is applied to each column of the matrix obtained. Further, in this paper, we consider the case n = 5.
Another approach denoted as DAT2 is given in Figure 7 and Figure 8. The DAT2 of depth 1 is defined as follows: first, the one-dimensional DAT of depth 1 is applied to each row of the matrix processed and then to each column of the matrix obtained (Figure 7). If this matrix transform is applied several times and each time just the upper left block, which contains low-frequency coefficients, is transformed, then the DAT2 of the depth n is obtained (Figure 8). Here, the depth n is several using the DAT2 of the depth 1. In this research, the cases n = 1, 2, 3, 4, 5 are considered. It is clear that the structure of the matrix of the DAT coefficients computed significantly depends on the structure of the applied matrix transform. Moreover, different mixes of DAT1 and DAT2 can be applied (Figure 9).
An appropriate inverse transform should be applied to reconstruct the source matrix. An absence of the direct transform specification makes reconstruction of the original data resource expensive, especially when processing a lot of high-resolution digital images. It is this feature that can be used to provide data protection. Additionally, DAT can be applied in combination with different partitioning schemes when the source matrix is divided into several parts and only after that the matrix transform is used (see, for example, algorithm ADCT [51]). Note that since the DAT of an array has computational complexity, which is linear in the size of the array processed [47], the complexity of the matrix transforms DAT1 and DAT2 is also linear:
T D A T 1 ( N ) = O ( N ) ,
T D A T 2 ( N ) = O ( N )
where N is several matrix elements, i.e., N is several pixels of an image processed. Note that the constants in the asymptotic expressions (2) and (3) are different, which may result in different expenses of time when processing the same matrix.
In [49], it was shown that the performance of the DAC algorithm depends on the structure of the matrix transform applied. From the results obtained, it follows that in most cases, a difference is minor. Note that it is lossy image compression using DAC that is studied in [49]. The following question arises: what is the dependence of the performance of the proposed lossless DAC on a structure of the DAT applied? Figure 10 show the results of one test photo compressing using DAC with DAT1 of the depth 5 and the algorithm ZIP, which is one of the most popular and widely supported data compression methods. The size of the BMP file with the test image is 11,528 KB. ZIP and DAC provide, respectively, 7744 KB and 5330 KB, which indicates that using DAC, it is possible to obtain better compression than using ZIP. Nevertheless, more complex research should be carried out. In Section 4, the corresponding study is presented.
Next, when applying DAC to lossy image processing, the results, in particular, the compression ratio and distortions, depend on quality loss settings, which are defined by coefficients of quantization [49,53]. In DAC, the parameter UBMAD defines the setting of quality loss:
U B M A D = i , j δ i j ,
where the coefficients δ i j are used in quantizing the elements of the blocks B i j of the matrix of DAT coefficients (see the Formulas (2), (3), and (8), (9) in [49]). Figure 10 show the compression result that is obtained for the case UBMAD = 95. It is proved in [49] that the variation of UBMAD leads to a variety of distortions. Hence, the difference between the source image and the reconstructed one depends on this parameter; therefore, the size of the file obtained using the proposed lossless DAC also depends on UBMAD. For this reason, the following question naturally arises: what is the value of UBMAD that provides the best compression? Section 4 answers this question.
Further, by construction, a unified approach to compressing both the quantized DAT coefficients and the elements of the difference matrix is used. This option provides a simple software implementation of the DAC algorithm. Indeed, its lossy mode should be supplemented with just one step that employs the encoding functions, which have already been developed, to obtain the lossless one. On the one hand, such unification can be useful in software implementation.
On the other hand, adaptive coding strategies can lead to higher compression efficiency. More complicated methods might provide better results. For instance, binary arithmetic coding, which is used in combination with complex data models and contexts, produces the great performance of the algorithms JPEG2000 [25,26], AGU [52], and ADCT [51]. Nevertheless, a complication of DAC may affect its further wide use and support.
Additionally, another useful feature is the possibility to reduce memory costs quickly due to switching from lossless compression to the lossy one. For this purpose, a part, which contains the compressed elements of the matrix of differences, i.e., the matrix C, can be deleted. Such an approach is of particular importance, especially if the “lossy” part of the DAC file (see Figure 2) contains data that provides a decompressed image of the acceptable quality. To illustrate this feature, consider the test photo provided in Figure 11a. It is a 544 × 393 full-color image. The size of the BMP file containing this photo is 626 KB. DAC with DAT1 of the depth 5 and UBMAD = 95 is applied.
The following results are obtained: the lossless and lossy modes provide compressed files of the size 312 KB and 59 KB, respectively. Note that lossless compression by ZIP (MS Windows 10 built-in function) produces 486 KB. In Figure 12b, the image, which is reconstructed after lossy compression by DAC, is presented. Comparing this image with the source one, it can be seen that there is no visual distortion. Additionally, quality loss metrics M A D and PSNR are computed: MAD = 18, PSNR = 40.9 dB, which indicate the high quality of the result obtained.
In Figure 12, representations of the considered test photo by different numbers of DAT coefficients are shown.
It is obvious that the image presented in Figure 12a has poor quality. It can be accepted only if an icon of the original image is required. Nevertheless, analyzing this image, the following conclusion can be made: Figure 12a quite possibly contains a face. More components provide more reliable recognition (see Figure 12b). Additionally, a small number of DAT coefficients corresponding to luma components of the image can be used to identify a person (Figure 12c). Finally, an increase in the number of DAT coefficients with a high probability provides the correct identification of the person (Figure 12d).
Thus, using the DAT procedure, it is possible to obtain a representation of digital images that satisfies the above requirements.

4. Efficiency of Lossless DAC

In the previous section, several particular examples of image processing using the proposed modification of the DAC algorithm were presented. It follows that its application to lossless image compression is promising. Nevertheless, to prove this statement, a more detailed analysis, which includes processing a greater number of test images, should be carried out. Further, an appropriate study is carried out.

4.1. Efficiency Analysis Approach

In the current research, a set of 24 test images from the database TID2013 is used [54]. These data were obtained from the Kodak lossless true color image suite [55]. Figure 13 show small copies of these pictures. Each of them is a 544 × 393 full-color image, saved in BMP format without compression. The size of any source file is 576 KB.
It is proposed to apply the following test data processing procedure:
(1)
Fix a structure of the procedure DAT; namely, DAT1 of the depth n = 5 and DAT2 of the depth n = 1 ,   2 ,   3 ,   4 ,   5 are considered;
(2)
Fix a value of the parameter U B M A D that defines coefficients of quantization;
(3)
Compress each test image by lossless DAC with the settings fixed and compute the compression ratio (CR):
C R = s i z e   o f   s o u r c e   f i l e s i z e   o f   c o m p r e s s e d   f i l e .
Further, it is suggested to determine the average, minimum, and maximum values of C R for each mode of DAC that is defined by the structure of DAT and the value of U B M A D .
The proposed approach provides, in particular, a dependence of CR on UBMAD for each structure of DAT considered. Additionally, the value of the parameter UBMAD, which results in the highest CR, can be determined.

4.2. Results of Test Data Processing

In Table 2, Table 3, Table 4, Table 5, Table 6 and Table 7, the results of the test data processing are given. Additionally, Figure 14 show the dependence of minimum, maximum, and average values of CR on the parameter UBMAD for each considered structure of DAT. In addition, in Table 8, the values of UBMAD, which provide the highest CR, are presented. Finally, a comparison of the total memory expenses required for storing the compressed and uncompressed data is presented in Table 9 and Figure 15 (each of the presented values is a sum of the sizes of image files of the corresponding format and is computed offline). Here, we note that the built-in functions are used in order to obtain ZIP compression, as well as images in PNG and TIFF formats.

5. Edge Computing-Based Application of DAC

5.1. Performance Analysis

From the results, which are presented in the previous section, it follows that the proposed lossless compression method provides sufficient memory cost reduction. We stress that this is achieved primarily due to the good approximation properties of the functions applied.
Further, for each considered structure of DAT, the dependence of the average (as well as minimum and maximum) value of C R on the parameter U B M A D is almost similar. It can be seen that C R as a function of U B M A D decreases for any considered U B M A D > U B M A D m a x , where the values of U B M A D m a x are presented in Table 8. It can be explained as follows: a higher value of this parameter produces a greater loss of quality [25] and, hence, greater memory expenses are required for storing the differences (see the structure of DAC-file, Figure 2). For this reason, it is expected that the behavior of C R ( U B M A D ) remains unchanged on the set [ U B M A D m a x ; + ) .
Next, comparing the highest values of C R for each structure of DAT (see the data in Table 2, Table 3, Table 4, Table 5, Table 6 and Table 7), one can conclude that the difference is minor (actually, the difference does not exceed 5.2 percent). It is also confirmed by the data presented in Table 9. This implies that significant variation in the structure of DAT applied does not result in a great variation of lossless compression performance. It is expected that the application of various mixes of DAT1 and DAT2 (for example, Figure 9) also provide the same efficiency. As in the case of lossy compression by DAC, this feature can be used to provide privacy protection of the image processed since there are a huge number of structures of the procedure DAT.
Analysis indicates the existence of more than 10 110 different image representations by DAT coefficients. Each of them is specified by the key that can be given by a sequence of bits. To obtain the correct content of the compressed image, an appropriate inverse DAT is required (see Figure 16). An absence of the key, which defines the correct decompression, makes unauthorized image viewing expensive in terms of the required computational resources. For this reason, we propose not to store a key, which is applied when compressing some images, in DAC files. Furthermore, the structure of the DAT applied cannot be uniquely determined by the size of this file. Meanwhile, we stress that the privacy protection features of the DAC algorithm require deeper investigation. This will be the object of further research.
If the requirement to ensure the lowest memory cost is the priority, especially when processing large datasets, then an appropriate structure of DAT must be used. In the case considered above, it is DAT2 of depth 3. Additionally, better compression can be obtained by improving the encoding procedure of DAC. For this purpose, the following modifications can be applied:
(1)
The implementation of context adaptive binary arithmetic coding (CABAC) [26]; here, we note that several data models and their construction may vary depending on the structure of DAT applied;
(2)
The usage of bit planes scanning of quantized DAT coefficient blocks; like in the algorithms JPEG2000 [25], ADCT [51], and AGU [52], this approach can be applied in combination with CABAC.
An efficient analysis of these propositions requires comprehensive research. Moreover, such modifications may increase the time and spatial complexity of DAC, which both have a negative impact, especially when implementing this algorithm in IoT devices.
We note that according to algorithmic taxonomy, which is presented for existing biometric privacy-enhancing techniques in [56], the proposed method of image protection belongs to representation-level approaches.
Furthermore, the proposed structure of the DAC file (Figure 2) is convenient for object recognition [2,3]. Indeed, a small amount of data, which defines the principal features of the image processed (see Figure 12), can be extracted from the compressed file in a fast manner. For this purpose, decompression of the whole file is not required. Additionally, if recognition or some other kinds of image analysis uses DAT coefficients to obtain the processing results, the application of inverse DAT is not required, which reduces complexity.
Moreover, computation of the image matrix is not “expensive” since the inverse DAT has linear time and space complexity [47]. So, the representation of an image by a set of DAT coefficients, which is used in combination with further compressing, is one of the solutions to the problem considered in this paper.

5.2. The Principal Steps of Image Processing by Atomic Functions

In Figure 17, the principal steps of image processing by atomic functions and their features are shown. Lossy DAC is presented. It can be easily modified to obtain a lossless mode of DAC. Note that, when operating digital images in an EC system, this process is performed on the device (smartphone, tablet PC, laptop, etc.), and can be considered a main preprocessing stage (see Figure 18). We stress that an application of the proposed DAT representation of the image provides the following:
(1)
Resource-efficient EC and training at the edge, which is of particular importance, for example, in intelligent transportation systems [57];
(2)
Easy implementation in fog EC and mobile EC architectures [18], as well as in “non-classic” ones, for instance, short supply circuit IoT [58];
(3)
Data protection, in particular, satisfies the so-called zero-trust principle, which belongs to the set of top trends [40]; a high level of protection and confidentiality is ensured by the great variety of settings, in particular, the atomic function applied in DAT and a structure of this core procedure, as well as several ways to encode quantized DAT coefficients; despite this, its comparison to other methods, for example, biometric security through visual encryption [59] and lightweight cryptographic algorithm [60], must be carried out;
(4)
Ability to construct artificial intelligence of things or AIoT systems [20], as well as that one which provides distributed learning, edge learning, and mobile intelligence [44].
Finally, from Table 9 and Figure 15, it follows that lossless DAC provides better compression than ZIP. This illustrates the fact that, in general, the algorithms which are developed to compress data of some special type, have higher performance than methods which can be applied to compressing data of any type [26]. Additionally, storing the test data in PNG and TIFF formats requires higher memory expenses than using DAC. Note that a very limited number of lossless image compression methods are applied. The results obtained show that DAC provides better compression than ZIP, PNG, and TIFF, which are widely supported. Nevertheless, a comparison of DAC to other lossless compression algorithms, which in most cases require specialized software tools, should be carried out. In particular, an ability to process and analyze digital images via directly manipulating the corresponding compressed data is of interest, especially when applying systems with low computational capabilities. This will be a topic of another research.

5.3. Application of Atomic Functions in Image Processing for EC in IoT Systems

The IoT context raises the issue of information compression and protection even more, as it requires reducing the load on communication channels and ensuring cybersecurity in data transmission. The introduction of EC just reduces the severity of these problems by focusing preprocessing on nodes. In terms of security, this shortens the chain of vulnerable elements and stages of transformation, although it requires more careful protection of EC nodes. Additionally, the limited capabilities of elements of the edge devices layer (see Figure 18) affect the applicability of data processing, including image compressing. Indeed, on the one hand, compression makes image files smaller and, hence, fewer resources are required for storing and transferring data between IoT system layers.
On the other hand, any high-resolution image processing is resource-intensive and reduces the time between charging or replacing the device battery. For this reason, the usage of compression algorithms, including DAC, must take into account the specifics of the IoT system application. For instance, if an edge device is used as a sensor, and all other data manipulations are performed by elements of other layers, then extremely low complexity algorithms (for example, QOI [27]) should be applied. The algorithm DAC should be preferred if a combination of compression and protection features is required. Moreover, the image can be well-presented by a small number of DAT coefficients (for example, see Figure 12) that allow the implementation of AI/ML technologies in edge devices. Furthermore, if such data processing is deployed at other layers, their load and communication networks can be reduced since just a limited number of DAT coefficients must be transferred and then processed. Furthermore, as mentioned above, matrices of DAT coefficients have a block structure (Figure 6, Figure 7 and Figure 8). Each of these blocks can be processed and analyzed by elements of edge and cloud layers independently, which speeds up obtaining results and their further usage.
In addition, the following question naturally arises: can the approach considered be applied to provide lossless image compression by other discrete transforms, in particular, DCT, and can a better performance be obtained in this case? Any lossy compression algorithm can be appended by encoding the difference between the source image and the decompressed one. In other words, the method applied in DAC can be used in a wide range of data compression techniques. The efficiency of the algorithm obtained in this way significantly depends on the functional properties of the constructive tools applied. From this point of view, DCT is one of the most suitable transforms due to the energy compaction property and extremeness of trigonometric polynomials { c o s ( k x ) ,   s i n ( k x ) } for the approximation of different functional classes [50].
Moreover, it provides the data representation that is widely used in different artificial intelligence and computer vision applications [29]. Nevertheless, the computational complexity of this procedure, as it is mentioned in Section 2, may impose some restrictions, especially when processing time requirements are very strict.

6. Conclusions

6.1. Discussion

It was shown in this paper that lossless image compression by the DAC algorithm with different structures of DAT, which is its core, can be obtained. Additionally, the current research has proved that variation of the DAT structure provides insignificant variation in the performance of the lossless compression method obtained.
As it was discussed, image representation by DAT coefficients, which is a description by atomic functions, can be considered a solution to the problem of such image representation development that provides compression and protection features in combination with ease of further analysis and object recognition. Meanwhile, other ways, which provide better efficiency in terms of different indicators, may exist.
The results of test data processing have shown that by using lossless DAC, it is possible to outperform the algorithm ZIP, which is one of the most popular data compression methods. However, a comparison with other lossless algorithms has not been made. It is supposed to be carried out in further research. Additionally, it is planned to modify the encoding procedure to improve the compression efficiency.
In addition, the great variety of structures of DAT provide a wide range of ways to represent data, in particular, digital images, and, hence, to develop different artificial intelligence methods while maintaining the uniformity of the construction approach. This feature may be useful, especially when creating systems which are resistant to attacks. It can be ensured by the generation and controlled choice of different DAC parameters, such as the structure of the procedure DAT applied and the atomic function u p s ( x ) that defines this discrete transform.

6.2. Future Research

Hence, an application of the proposed image representation by atomic functions to IoT systems, which are used in combination with EC and AI, is promising. Future research can be related to the spatial complexity reduction of the DAC algorithm and the development of methods and algorithms for the multi-parametrical presentation and implementation of atomic functions to decrease the risks of successful attacks on the confidentiality and integrity of IoT systems, such as autonomous systems based on UAV fleets [61] and ground robots [62] for pre- and post-monitoring severe accidents of NPPs and other objects of critical energy, transport, and industrial infrastructures.
Within the framework of the study, no specific cases were considered for the most common methods used in UAV or UAV fleets/swarms, but only for this task. However, in our opinion, they can be fully adapted to improve the nomenclature of the airborne apparatus of Internet of Drones technology and Flying Edge Platforms [63]. Such an adaptation is useful in additional assessments of the complexity of the algorithms of compression and refinement for the image of a specific subject area.

Author Contributions

Conceptualization, V.M., V.L. and V.K.; Methodology, V.M. and V.L.; Software, V.M.; Validation, V.M. and V.L.; Formal Analysis, V.M. and V.L.; Investigation, V.M., V.L. and V.K.; Resources, O.I. and V.K.; Data Curation, V.L.; Writing—Original Draft Preparation, V.M.; Writing—Review and Editing, O.I. and V.K.; Visualization, V.M. and V.L.; Supervision, O.I. and V.K.; Project Administration, V.M.; Funding Acquisition, O.I. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Acknowledgments

This work was supported by the ECHO project, which has received funding from the European Union’s Horizon 2020 research and innovation program under grant agreement no 830943. The authors appreciate the scientific society of the consortium and, in particular, the staff of the Department of Computer Systems, Networks and Cybersecurity of the National Aerospace University “KhAI” for invaluable inspiration, hard work, and creative analysis during the preparation of this paper. The authors are personally grateful to V.A. Rvachev for his attention and support of this research.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gonzalez, R.C.; Woods, R.E. Digital Image Processing, 4th ed.; Pearson: London, UK, 2018. [Google Scholar]
  2. Scherer, R. Computer Vision Methods for Fast Image Classification and Retrieval; Springer: Cham, Switzerland, 2020. [Google Scholar] [CrossRef]
  3. Tan, C.; Leibo, J.Z.; Poggio, T.; Cipolla, R.; Battiato, S.; Farinella, G.M. Machine Learning for Computer Vision; Springer: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
  4. Van Vinh, P.; Dung, P.X.; Tien, P.T.; Hang, T.T.T.; Duc, T.H.; Nhat, T.D. Smart Home Security System Using Biometric Recognition. In IoT as a Service, IoTaaS 2020; Li, B., Li, C., Yang, M., Yan, Z., Zheng, J., Eds.; Springer: Cham, Switzerland, 2021; Volume 346, pp. 405–420. [Google Scholar] [CrossRef]
  5. Ghannam, R.B.; Techtmann, S.M. Machine learning applications in microbial ecology, human microbiome studies, and environmental monitoring. Comput. Struct. Biotechnol. J. 2021, 19, 1092–1107. [Google Scholar] [CrossRef] [PubMed]
  6. Fujiyoshi, H.; Hirakawa, T.; Yamashita, T. Deep learning-based image recognition for autonomous driving. IATSS Res. 2019, 43, 244–252. [Google Scholar] [CrossRef]
  7. Wiriyathammabhum, P.; Summers-Stay, D.; Fermüller, C.; Aloimonos, Y. Computer Vision and Natural Language Processing: Recent Approaches in Multimedia and Robotics. ACM Comput. Surv. 2017, 49, 1–44. [Google Scholar] [CrossRef]
  8. Rayes, A.; Salam, S. Internet of Things from Hype to Reality: The Road to Digitization, 3rd ed.; Springer: Cham, Switzerland, 2022. [Google Scholar]
  9. Pillai, D.K. New Computational Models for Image Remote Sensing and Big Data. In Big Data Analytics for Satellite Image Processing and Remote Sensing; Swarnalatha, P., Sevugan, P., Eds.; IGI Global: Hershey, PA, USA, 2018; pp. 232–248. [Google Scholar] [CrossRef]
  10. People will Take 1.2 Trillion Digital Photos This Year—Thanks to Smartphones. Available online: https://www.businessinsider.com/12-trillion-photos-to-be-taken-in-2017-thanks-to-smartphones-chart-2017-8 (accessed on 10 April 2022).
  11. The SICAS Medical Image Repository. Available online: https://www.smir.ch (accessed on 10 April 2022).
  12. Sentinel-2. Available online: https://sentinel.esa.int/web/sentinel/missions/sentinel-2 (accessed on 10 April 2022).
  13. Large-scale CelebFaces Attributes (CelebA) Dataset. Available online: http://mmlab.ie.cuhk.edu.hk/projects/CelebA.html (accessed on 10 April 2022).
  14. Jwa, A.S.; Poldrack, R.A. The spectrum of data sharing policies in neuroimaging data repositories. Hum. Brain Mapp. 2022, 43, 2707–2721. [Google Scholar] [CrossRef] [PubMed]
  15. Rady, M.; Abdelkader, T.; Ismail, R. Integrity and Confidentiality in Cloud Outsourced Data. Ain Shams Eng. J. 2019, 10, 275–285. [Google Scholar] [CrossRef]
  16. Alhirabi, N.; Rana, O.; Perera, C. Security and Privacy Requirements for the Internet of Things: A Survey. ACM Trans. Internet Things 2021, 2, 1–37. [Google Scholar] [CrossRef]
  17. Sajedi, H. Applications of data hiding techniques in medical and healthcare systems: A survey. Netw. Modeling Anal. Health Inform. Bioinform. 2018, 7, 6. [Google Scholar] [CrossRef]
  18. Mansouri, Y.; Ali Babar, M. A review of edge computing: Features and resource virtualization. J. Parallel Distrib. Comput. 2021, 150, 155–183. [Google Scholar] [CrossRef]
  19. Avasalcai, C.; Murturi, I.; Dustdar, D. Edge and Fog: A Survey, Use Cases, and Future Challenges. In Fog Computing: Theory and Practice; Abbas, A., Khan, S.U., Zomaya, A.Y., Eds.; John Wiley & Sons: Hoboken, NJ, USA, 2020; pp. 43–66. [Google Scholar]
  20. Chang, Z.; Liu, S.; Xiong, X.; Cai, Z.; Tu, G. A Survey of Recent Advances in Edge-Computing-Powered Artificial Intelligence of Things. IEEE Internet Things J. 2021, 8, 13849–13875. [Google Scholar] [CrossRef]
  21. AI Cybersecurity Challenges. Threat Landscape for Artificial Intelligence; The European Union Agency for Cybersecurity. 2020. Available online: https://www.enisa.europa.eu/publications/artificial-intelligence-cybersecurity-challenges (accessed on 10 April 2022).
  22. Cybersecurity Challenges in the Uptake of Artificial Intelligence in Autonomous Driving; The European Union Agency for Cybersecurity. 2021. Available online: https://www.enisa.europa.eu/publications/enisa-jrc-cybersecurity-challenges-in-the-uptake-of-artificial-intelligence-in-autonomous-driving (accessed on 10 April 2022).
  23. Pevnev, V.; Torinyk, V.; Kharchenko, V.S. Cyber security of wireless smart systems channels of intrusions and radio frequency vulnerabilities. Radioelectron. Comput. Syst. 2020, 96, 74–91. [Google Scholar] [CrossRef]
  24. Kolisnyk, M. Vulnerability analysis and method of selection of communication protocols for information transfer in Internet of Things systems. Radioelectron. Comput. Syst. 2021, 1, 133–149. [Google Scholar] [CrossRef]
  25. Shi, Y.-Q.; Sun, H. Image and Video Compression for Multimedia Engineering, 3rd ed.; CRC Press: Boca Raton, FL, USA, 2019. [Google Scholar]
  26. Sayood, K. Introduction to Data Compression, 5th ed.; Morgan Kaufman: Cambridge, MA, USA, 2017. [Google Scholar]
  27. The Quite OK Image Format for Fast, Lossless Compression. Available online: https://qoiformat.org/ (accessed on 10 April 2022).
  28. Number of Smartphones Sold to End Users Worldwide from 2007 to 2021. Available online: https://www.statista.com/statistics/263437/global-smartphone-sales-to-end-users-since-2007 (accessed on 10 April 2022).
  29. Chowdhary, C.L.; Alazab, M.; Chaudhary, A.; Hakak, S.; Gadekallu, T.R. Computer Vision and Recognition Systems Using Machine and Deep Learning Approaches; IET: London, UK, 2021; Volume 42. [Google Scholar]
  30. Amount of Data Created, Consumed and Stored 2010–2025. Available online: https://www.statista.com/statistics/871513/worldwide-data-created/ (accessed on 10 April 2022).
  31. Global Losses from Cybercrime Skyrocketed to Nearly $1 Trillion in 2020, New Report Finds. Available online: https://www.washingtonpost.com/politics/2020/12/07/cybersecurity-202-global-losses-cybercrime-skyrocketed-nearly-1-trillion-2020/ (accessed on 10 April 2022).
  32. Kizza, J.M. Guide to Computer Network Security; Springer: Cham, Switzerland, 2020. [Google Scholar] [CrossRef]
  33. General Data Protection Regulation GDPR. Available online: https://gdpr-info.eu/ (accessed on 10 April 2022).
  34. Aumasson, J.-P. Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer; No Starch Press: San Francisco, CA, USA, 2021. [Google Scholar]
  35. Ali, W.; Tian, W.; Din, S.; Khan, A.A. Classical and modern face recognition approaches: A complete review. Multimed. Tools Appl. 2021, 80, 4825–4880. [Google Scholar] [CrossRef]
  36. Fuad, T.H.; Fime, A.A.; Sikder, D.; Iftee, A.R.; Rabbi, J.; Al-Rakhami, M.S.; Gumaei, A.; Sen, O.; Fuad, M.; Islam, N. Recent Advances in Deep Learning Techniques for Face Recognition. IEEE Access 2021, 9, 99112–99142. [Google Scholar] [CrossRef]
  37. Kharchenko, V.; Illiashenko, O. Concepts of Green IT Engineering: Taxonomy, Principles and Implementation. In Green IT Engineering: Concepts, Models, Complex Systems Architectures; Kharchenko, V., Kondratenko, Y., Kacprzyk, J., Eds.; Springer: Cham, Switzerland, 2016; Volume 74, pp. 3–19. [Google Scholar] [CrossRef]
  38. Data Storage Trends to Watch Out for in 2022. Available online: https://www.intelligentcio.com/eu/2022/01/18/data-storage-trends-to-watch-out-for-in-2022 (accessed on 10 April 2022).
  39. Storage and Infrastructure Trends for 2022. Available online: https://www.datacenterdynamics.com/en/opinions/storage-and-infrastructure-trends-for-2022 (accessed on 10 April 2022).
  40. Three Trends to Guide Your Data Protection Strategy in 2022. Available online: https://tdwi.org/articles/2021/12/01/dwt-all-three-trends-to-guide-your-data-protection-strategy-in-2022.aspx (accessed on 10 April 2022).
  41. Data Privacy Trends to Watch in 2022–2025. Available online: https://infopulse-scm.com/articles/main-data-privacy-trends-to-watch-in-2022-2025 (accessed on 10 April 2022).
  42. Dong, Y.; Bai, J.; Chen, X. A Review of Edge Computing Nodes based on the Internet of Things. In Proceedings of the 5th International Conference on Internet of Things, Big Data and Security (IoTBDS 2020), SCITEPRESS—Science and Technology Publications, online, 7–9 May 2020; pp. 313–320. [Google Scholar] [CrossRef]
  43. Top 3 Trends in Computer Vision for 2022. Available online: https://blog.superannotate.com/computer-vision-trends (accessed on 10 April 2022).
  44. Filho, C.P.; Marques, E., Jr.; Chang, V.; dos Santos, L.; Bernardini, F.; Pires, P.F.; Ochi, L.; Delicato, F.C. A Systematic Literature Review on Distributed Machine Learning in Edge Computing. Sensors 2022, 22, 2665. [Google Scholar] [CrossRef]
  45. Ometov, A.; Molua, O.L.; Komarov, M.; Nurmi, J. A Survey of Security in Cloud, Edge, and Fog Computing. Sensors 2022, 22, 927. [Google Scholar] [CrossRef]
  46. Rvachev, V.A. Compactly supported solutions of functional-differential equations and their applications. Russ. Math. Surv. 1990, 45, 87–120. [Google Scholar] [CrossRef]
  47. Makarichev, V.; Lukin, V.; Brysina, I. On the Applications of the Special Class of Atomic Functions: Practical Aspects and Perspectives. In Integrated Computer Technologies in Mechanical Engineering; Nechyporuk, M., Pavlikov, V., Kritskiy, D., Eds.; Springer: Cham, Switzerland, 2021; Volume 188, pp. 42–54. [Google Scholar] [CrossRef]
  48. Makarichev, V.; Kharchenko, V. Application of dynamic programming approach to computation of atomic functions. Radioelectron. Comput. Syst. 2021, 100, 36–45. [Google Scholar] [CrossRef]
  49. Makarichev, V.; Vasilyeva, I.; Lukin, V.; Vozel, B.; Shelestov, A.; Kussul, N. Discrete Atomic Transform-Based Lossy Compression of Three-Channel Remote Sensing Images with Quality Control. Remote Sens. 2022, 14, 125. [Google Scholar] [CrossRef]
  50. Chui, C.K.; Jiang, Q. Applied Mathematics: Data Compression, Spectral Methods, Fourier Analysis, Wavelets, and Applications; Atlantis Press: Paris, France, 2013. [Google Scholar]
  51. ADCT: A New High Quality DCT Based Coder for Lossy Image Compression. Available online: https://ponomarenko.info/adct.htm (accessed on 10 April 2022).
  52. AGU—DCT Based High Quality Image Compression. Available online: http://www.ponomarenko.info/agu.htm (accessed on 10 April 2022).
  53. Makarichev, V.O.; Lukin, V.V.; Brysina, I.V. On Estimates of Coefficients of Generalized Atomic Wavelets Expansions and their Application to Data Processing. Radioelectron. Comput. Syst. 2020, 93, 44–57. [Google Scholar] [CrossRef]
  54. TAMPERE IMAGE DATABASE 2013 TID2013, Version 1.0. Available online: http://www.ponomarenko.info/tid2013.htm (accessed on 10 April 2022).
  55. Kodak Lossless True Color Image Suite. Available online: http://r0k.us/graphics/kodak/ (accessed on 10 April 2022).
  56. Meden, B.; Rot, P.; Terhörst, P.; Damer, N.; Kuijper, A.; Scheirer, W.J.; Ross, A.; Peer, P.; Štruc, V. Privacy–Enhancing Face Biometrics: A Comprehensive Survey. IEEE Trans. Inf. Forensics Secur. 2021, 16, 4147–4183. [Google Scholar] [CrossRef]
  57. Zhou, X.; Ke, R.; Yang, H.; Liu, C. When Intelligent Transportation Systems Sensing Meets Edge Computing: Vision and Challenges. Appl. Sci. 2021, 11, 9680. [Google Scholar] [CrossRef]
  58. Debauche, O.; Mahmoudi, S.; Guttadauria, A. A New Edge Computing Architecture for IoT and Multimedia Data Management. Information 2022, 13, 89. [Google Scholar] [CrossRef]
  59. Abdul, W.; Ali, Z.; Ghouzali, S.; Alfawaz, B.; Muhammad, G.; Hossain, M.S. Biometric Security Through Visual Encryption for Fog Edge Computing. IEEE Access 2017, 5, 5531–5538. [Google Scholar] [CrossRef]
  60. Gao, R.; Li, S.; Gao, Y.; Guo, R. A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving. Cybersecurity 2021, 4, 3. [Google Scholar] [CrossRef]
  61. Sachenko, A.; Kochan, V.; Kharchenko, V.; Yastrebenetsky, V.; Fesenko, H.; Yanovsky, M. NPP Post-Accident Monitoring System Based on Unmanned Aircraft Vehicle: Concept, Design Principle. Nucl. Radiat. Saf. 2017, 73, 24–29. [Google Scholar] [CrossRef]
  62. Zhang, Q.; Wang, W.Z.S.C.L.; Fu, J.; Yang, J.; Gao, B. Research Progress of Nuclear Emergency Response Robot. IOP Conf. Ser. Mater. Sci. Eng. 2018, 452, 042102. [Google Scholar] [CrossRef]
  63. Uddin, M.A.; Ayaz, M.; Mansour, A.; Aggoune, e.-H.; Sharif, Z.; Razzak, I. Cloud-connected flying edge computing for smart agriculture. Peer-to-Peer Netw. Appl. 2021, 14, 3405–3415. [Google Scholar] [CrossRef]
Figure 1. Discrete atomic compression of digital images.
Figure 1. Discrete atomic compression of digital images.
Sensors 22 03751 g001
Figure 2. Extension of DAC file.
Figure 2. Extension of DAC file.
Sensors 22 03751 g002
Figure 3. Lossless DAC: compression of the full-color digital image.
Figure 3. Lossless DAC: compression of the full-color digital image.
Sensors 22 03751 g003
Figure 4. Lossless DAC: decompression of full-color digital image.
Figure 4. Lossless DAC: decompression of full-color digital image.
Sensors 22 03751 g004
Figure 5. Discrete atomic transform of an array.
Figure 5. Discrete atomic transform of an array.
Sensors 22 03751 g005
Figure 6. A structure of the matrix transform DAT1 of the depth 5.
Figure 6. A structure of the matrix transform DAT1 of the depth 5.
Sensors 22 03751 g006
Figure 7. A structure of the matrix transform DAT2 of the depth 1.
Figure 7. A structure of the matrix transform DAT2 of the depth 1.
Sensors 22 03751 g007
Figure 8. A structure of the matrix transform DAT2 of the depth n.
Figure 8. A structure of the matrix transform DAT2 of the depth n.
Sensors 22 03751 g008
Figure 9. Mix of DAT1 and DAT2.
Figure 9. Mix of DAT1 and DAT2.
Sensors 22 03751 g009
Figure 10. Compression of the test photo by ZIP and lossless DAC with DAT1 of the depth 5.
Figure 10. Compression of the test photo by ZIP and lossless DAC with DAT1 of the depth 5.
Sensors 22 03751 g010
Figure 11. A 24-bit full-color digital image, 544 × 393, 626 KB (BMP): original (a); reconstructed after lossy compression using DAC with DAT1 of the depth 5 (UBMAD = 95) (b).
Figure 11. A 24-bit full-color digital image, 544 × 393, 626 KB (BMP): original (a); reconstructed after lossy compression using DAC with DAT1 of the depth 5 (UBMAD = 95) (b).
Sensors 22 03751 g011
Figure 12. Representation of the image shown in Figure 11a by different number of DAT-coefficients: 0.34 percent of all values (a); 1.32 percent of all values (b); 1.73 percent of all components (c); 11.2 percent of all components (d).
Figure 12. Representation of the image shown in Figure 11a by different number of DAT-coefficients: 0.34 percent of all values (a); 1.32 percent of all values (b); 1.73 percent of all components (c); 11.2 percent of all components (d).
Sensors 22 03751 g012
Figure 13. Small copies of test images.
Figure 13. Small copies of test images.
Sensors 22 03751 g013
Figure 14. Dependence of the minimum, maximum, and average values of CR on UBMAD for different structures of the procedure DAT: DAT1 of depth 5 (a); DAT2 of depth 1 (b); DAT2 of depth 2 (c); DAT2 of depth 3 (d); DAT2 of depth 4 (e); DAT2 of depth 5 (f).
Figure 14. Dependence of the minimum, maximum, and average values of CR on UBMAD for different structures of the procedure DAT: DAT1 of depth 5 (a); DAT2 of depth 1 (b); DAT2 of depth 2 (c); DAT2 of depth 3 (d); DAT2 of depth 4 (e); DAT2 of depth 5 (f).
Sensors 22 03751 g014
Figure 15. Total memory expenses required for storing the compressed and uncompressed data.
Figure 15. Total memory expenses required for storing the compressed and uncompressed data.
Sensors 22 03751 g015
Figure 16. Decompression of the image given in Figure 11a: correct (a); incorrect (b,c).
Figure 16. Decompression of the image given in Figure 11a: correct (a); incorrect (b,c).
Sensors 22 03751 g016
Figure 17. The principal steps of image processing by atomic functions.
Figure 17. The principal steps of image processing by atomic functions.
Sensors 22 03751 g017
Figure 18. Application of atomic functions in image processing for EC in IoT systems.
Figure 18. Application of atomic functions in image processing for EC in IoT systems.
Sensors 22 03751 g018
Table 1. Summary of the related works.
Table 1. Summary of the related works.
SourceFeatures
Y.-Q. Shi and H. Sun [25]
(1)
fundamentals of data compression are given;
(2)
image and video compression is a focus;
(3)
a brief description of data protection is provided.
K. Sayood [26]
(1)
data compression fundamentals and principles are presented;
(2)
basic data algorithms are considered;
(3)
insufficient attention is paid to data protection functions.
QOI [27]
(1)
a fast lossless image compression algorithm and the corresponding image format are given;
(2)
data protection property is not provided;
(3)
an ability to process and analyze the image compressed without decompression requires investigation.
V. Makarichev, V. Lukin and I. Brysina [47]
(1)
ways   to   apply   atomic   functions   u p s ( x ) to data processing are discussed, and the complexity of the corresponding algorithms is studied;
(2)
data compression and protection features are not a focus of this paper.
V. Makarichev and V. Kharchenko [48]
(1)
a   dynamic   algorithm   for   computation   of   values   of   u p s ( x ) is developed, and its complexity is studied;
(2)
the results obtained provide various applications of these functions, in particular, data processing;
(3)
data compression and protection features are not a focus of this paper.
V. Makarichev, I. Vasilyeva, V. Lukin, B. Vozel, A. Shelestov and N. Kussul [49]
(1)
performance   of   lossy   image   compression   based   on   atomic   functions   u p s ( x ) is studied;
(2)
data protection feature is discussed;
(3)
lossless image compression is not considered.
C.K. Chui and Q. Jiang [50]
(1)
fundamental constructive tools, which are applied in data compression, are presented, and their applications are given;
(2)
image representation by trigonometric polynomials and wavelets is discussed;
(3)
data protection feature is not a focus.
ADCT [51]
(1)
the algorithm ADCT, which is based on DCT, is presented, and its performance is studied;
(2)
lossless compression and data protection features are not discussed.
AGU [52]
(1)
the algorithm ADCT, which is based on DCT, is presented, and its performance is studied;
(2)
lossless compression and data protection features are not discussed.
Table 2. Dependence of the minimum, maximum, and average values of CR on UBMAD for the case of DAT1 of depth 5.
Table 2. Dependence of the minimum, maximum, and average values of CR on UBMAD for the case of DAT1 of depth 5.
UBMADMin (CR)Average (CR)Max (CR)
361.46511.69221.9062
631.55571.80662.0128
951.50911.75372.0029
1551.47811.70931.9989
Table 3. Dependence of the minimum, maximum, and average values of CR on UBMAD for the case of DAT2 of depth 1.
Table 3. Dependence of the minimum, maximum, and average values of CR on UBMAD for the case of DAT2 of depth 1.
UBMADMin (CR)Average (CR)Max (CR)
41.55721.86562.0937
121.59791.85352.0896
201.54981.74272.0441
321.49341.65571.8381
Table 4. Dependence of the minimum, maximum, and average values of CR on UBMAD for the case of DAT2 of depth 2.
Table 4. Dependence of the minimum, maximum, and average values of CR on UBMAD for the case of DAT2 of depth 2.
UBMADMin (CR)Average (CR)Max (CR)
71.53131.79152.0071
141.58951.88182.1247
201.57891.80532.1248
321.46071.70482.0633
Table 5. Dependence of the minimum, maximum, and average values of CR on UBMAD for the case of DAT2 of depth 3.
Table 5. Dependence of the minimum, maximum, and average values of CR on UBMAD for the case of DAT2 of depth 3.
UBMADMin (CR)Average (CR)Max (CR)
101.53071.79202.2029
191.63111.89962.2062
221.58031.82562.1508
321.50731.72242.0439
Table 6. Dependence of the minimum, maximum, and average values of CR on UBMAD for the case of DAT2 of depth 4.
Table 6. Dependence of the minimum, maximum, and average values of CR on UBMAD for the case of DAT2 of depth 4.
UBMADMin (CR)Average (CR)Max (CR)
131.50911.76532.0112
251.59441.88792.1621
341.57991.82822.2003
501.47041.73552.1422
Table 7. Dependence of the minimum, maximum, and average values of CR on UBMAD for the case of DAT2 of depth 5.
Table 7. Dependence of the minimum, maximum, and average values of CR on UBMAD for the case of DAT2 of depth 5.
UBMADMin (CR)Average (CR)Max (CR)
161.48801.73711.9795
311.58991.84392.1490
561.53491.76852.1474
711.50291.72892.1159
Table 8. Values of the parameter U B M A D m a x that provide the highest CR for each structure of DAT.
Table 8. Values of the parameter U B M A D m a x that provide the highest CR for each structure of DAT.
Structure of DATUBMADmax
DAT1 of depth 563
DAT2 of depth 14
DAT2 of depth 214
DAT2 of depth 319
DAT2 of depth 425
DAT2 of depth 531
Table 9. Total memory expenses required for storing the compressed and uncompressed data.
Table 9. Total memory expenses required for storing the compressed and uncompressed data.
CompressorMemory Expenses, KB
DAC with DAT1 of depth 57699
DAC with DAT2 of depth 17461
DAC with DAT2 of depth 27395
DAC with DAT2 of depth 37329
DAC with DAT2 of depth 47376
DAC with DAT2 of depth 57548
ZIP of source9159
PNG9745
TIFF10,578
source (BMP-files)13,824
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Makarichev, V.; Lukin, V.; Illiashenko, O.; Kharchenko, V. Digital Image Representation by Atomic Functions: The Compression and Protection of Data for Edge Computing in IoT Systems. Sensors 2022, 22, 3751. https://doi.org/10.3390/s22103751

AMA Style

Makarichev V, Lukin V, Illiashenko O, Kharchenko V. Digital Image Representation by Atomic Functions: The Compression and Protection of Data for Edge Computing in IoT Systems. Sensors. 2022; 22(10):3751. https://doi.org/10.3390/s22103751

Chicago/Turabian Style

Makarichev, Viktor, Vladimir Lukin, Oleg Illiashenko, and Vyacheslav Kharchenko. 2022. "Digital Image Representation by Atomic Functions: The Compression and Protection of Data for Edge Computing in IoT Systems" Sensors 22, no. 10: 3751. https://doi.org/10.3390/s22103751

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop