<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analytical Links in the Tasks of Digital Content Compression</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>O.S.Popov Odessa National Academy of Telecommunication</institution>
          ,
          <addr-line>Odessa</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The article is devoted to the development of a digital image compression algorithm. Image compression is a type of data compression applied to digital images, to reduce their cost for storage or transmission. Algorithms may take advantage of visual perception and the statistical properties of image data. We will consider a lossy compression algorithm. The new algorithm is based on multiscale decomposition with a spline as a basis function. In the process of multiscale analysis, when constructing a spline, we should take into account analytical links. The application of this approach give an increase in the compression ratio with the same quality of compressed images.</p>
      </abstract>
      <kwd-group>
        <kwd>Digital Image Compression</kwd>
        <kwd>Analytical Links</kwd>
        <kwd>Hermitian Spline</kwd>
        <kwd>Multiscale Analysis</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Multimedia standards for video compression for personalized television, high
definition digital television (HDTV), and image / video database maintenance use close
motion and encoding methods. Three basic standards - MPEG-1, MPEG-2 and
MPEG-4 were developed by the Moving Picture Experts Group (MPEG), under the
auspices of the ISO and the International Telegraph and Telephone Consultative
Committee (was renamed the International Telegraph Union (ITU). A typical MPEG
encoder uses redundancy both within the frame and between adjacent frames, the
uniformity of movements between frames, and the psychophysical properties of the
human visual system. Each frame is compressed as a digital image [1].</p>
      <p>Image compression is when you remove or group together certain parts of an
image file in order to reduce its size. Here are a few reasons.</p>
      <p> For website optimization. Sites with uncompressed images can take longer to
load, and can cause your visitors to bounce because of this.
 For sending and uploading images. Uploading an uncompressed image can take
a while, and some email servers have a file size limit.</p>
      <p> For reducing the storage impact on your hard drive.</p>
      <p>Image compression is useful for a variety of reasons and it is dependent upon the
image size reduction you aim to achieve along with the quality level you plan to keep
that will determine which form of compression you should use.</p>
      <p>There are two kinds of image compression methods - lossless and lossy.</p>
      <p>Lossy compression methods, especially when used at low bit rates, introduce
compression artifacts. Lossy methods are especially suitable for natural images such
as photographs in applications.</p>
      <p>JPEG, this format gets rid of bits and pieces of a photo that you may notice
depending upon the level of compression you apply. A normal amount of compression
will not be noticeable, while extreme compression may be obvious. If you rotate the
JPG too much, you’ll notice a difference in quality. This is because the photo has to
recompress itself with every rotation, losing some data in the process. There are
however programs out there that rotate a JPG losslessly.
2</p>
      <p>Literature Analysis and Problem Statement</p>
    </sec>
    <sec id="sec-2">
      <title>Methods for lossy compression:</title>
      <p> Transform coding – This is the most commonly used method.
 Discrete Cosine Transform (DCT) – The most widely used form of lossy
compression. It is a type of Fourier-related transform [2]. The DCT is sometimes
referred to as "DCT-II" in the context of a family of discrete cosine transforms. It
is generally the most efficient form of image compression.DCT is used in
JPEG, the most popular lossy format.
 Wavelet transform is also used extensively, followed by quantization and
entropy coding.
 Reducing the color space to the most common colors in the image. The selected
colors are specified in the colour palette in the header of the compressed image.
Each pixel just references the index of a color in the color palette, this method
can be combined with dithering to avoid posterization.
 Chroma subsampling. This takes advantage of the fact that the human eye
perceives spatial changes of brightness more sharply than those of color, by
averaging or dropping some of the chrominance information in the image.
 Fractal compression.</p>
      <p>An important development in image data compression was the discrete cosine
transform (DCT), a lossy compression technique first proposed by Nasir Ahmed in
1972.[8] DCT compression became the basis for JPEG, which was introduced by the
Joint Photographic Experts Group (JPEG) in 1992.[9] JPEG compresses images down
to much smaller file sizes, and has become the most widely used image file format
[10]. Its highly efficient DCT compression algorithm was largely responsible for the
wide proliferation of digital images and digital photos [11], with several billion JPEG
images produced every day as of 2015 [12].</p>
      <p>We propose to use spline multiscale analysis with the imposition of analytical
links instead DCT or wavelet decomposition in the compression process.</p>
      <p>In [22] the problem of reconciliation of flight data with the use of a priori
analytical excess, which is in kinematic ratios and equations of motion of the center of mass,
which are expressed due to overload (acceleration) in the center of mass, is
considered. Other a priori links between the measured parameters are also possible. This
article discusses various model problems of smoothing two or more time series in the
presence of linear and nonlinear a priori analytical relations between the measured
values. It is natural to use such a priori connections, both when systematic errors are
estimated and to improve the accuracy of data processing in the presence of random
errors. Articles [25,26] show that taking into account the analytic coupling reduces
the root mean square deviation of the constructed spline from its deterministic basis,
so decreases the error value.</p>
      <p>The use of wavelet signal processing in MPEG-4 provides the ability to effectively
compress and recover signals with low quality loss, as well as to solve signal filtering
problems. One of the main and especially productive ideas of wavelet signal
representation at different levels of decomposition is to separate the approximation functions
of the signal into two groups: approximate - rough (with sufficiently slow time
dynamics of changes), and detailing (with local and fast dynamics of changes against the
background of smooth dynamics), with their further fragmentation and detailing at
other levels of signal decomposition (multiscale analysis).</p>
      <p>It is interesting to consider analytic communication in the process of multiscale
analysis with the spline functions used to compress graphical data.
3</p>
      <p>Spline approximation of analytically linked image lines</p>
    </sec>
    <sec id="sec-3">
      <title>Consider the problem in this formulation.</title>
      <p>
        The sequences of two rows of the matrix of the same color component of the
digital image are represented by counts:
y1(t)  y1(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), y1(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),..., y1(N )
      </p>
      <p>
        and
y2 (t)  y2 (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), y2 (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),..., y2 (N ).
      </p>
    </sec>
    <sec id="sec-4">
      <title>Consider the procedure for building a spline.</title>
      <p>Let on the segment [a,b] in the points X = xi iN1 the values Y = yi iN1 of some
smooth function are given.</p>
      <p>You need to find a grid r  ~x r
j j 0
r  N , where you can build a spline
S ( x)  Cka,b, K  1,2,..., that has continuous derivatives up to kth order
(including). According to the formulation of the problem, the grids
coincide, that is, on each section of the grid  r there may be several points, which
will determine the behavior of the desired dependency.
 N і  r does not
ent derivatives values at the knots of the grid  r . By analogy, we take as an
approximate value of the first derivative at the point</p>
      <p>h j h j 1
and as an approximate value of the second derivative</p>
      <p>aj  2a~xj1 , ~xj , ~xj1  .
aj   j
a j  a j 1  
j
a j 1  a j ,</p>
      <p>Taking into account the above relations in the construction of the Hermitian cubic
spline the elements of the planning matrix X will be determined by the formulas:
xi0 1X i2I x ~x2 2X i1I x ~x1 , i  1, m ,
2
xi11X i3I x ~x3 2X i2I x ~x2 3X i1I x ~x1 , i  1, m3 ,
xij 1X ij  2 I x ~xj  2  2X ij 1I x ~xj 1 3X ij I x ~xj  4X ij 1I x ~xj 1 ,
j  2, r  2 , i  1  m1, mr  2 ,
xir12X i r I x ~xr 3X i r 1I x ~xr 1 4X i r 2
, i  1 mr 3, m ,
r
xir 3X</p>
      <p>I ~x 4X
i r x r</p>
      <p>~
i r 1I x (xr 1) , i  1  mr  2 , mr
1

where Ix ~xj   
0

if
if
x  ~xj  ~xj  ~xj1
x ~xj , j  1, r;
h 2j xij 1  xij 2
h j 1h j 1  h j 
h j xi2j 1  xij   h j xij 1  xij 
2 X ij  1  xij  h j  h j1  h j1
, j  2, r 1, i  1  m j 1, m ;
j
3</p>
      <p>X ij  xij </p>
      <p>j i2j 1  x 
h x</p>
      <p>ij 
h j 1
h j xij 1  xij 2</p>
      <p>h j 1  h j
2 X ir  1 xir  hr xir 1 xir  , i  1  mr 1, m ;
2
r
3</p>
      <p>X i1  xi1 
1 i211  x 
h x
i1 , i  1, m ;</p>
      <p>1
hr1
h2
, j  2, r 1, i  1  m j 1, m ;
j
h 2j xi2j 1  xij </p>
      <p>hr 1  hr
3 X ir  xir  hr xir 1  xir  , i  1  mr 1, m ;
2
r
4 X ij  </p>
      <p>h j1 h j  h j1  , j  1, r  1, i  1  m j 1, m j ;
xij  xi  ~xj 1 ; h j  ~xj  ~xj 1 ; j  1, r ;</p>
      <p>h j
xi  ~xj1 , ~xj  ,</p>
      <p>j  1, r  1 ; xi  ~xr 1, ~xr ;
m j  uj 1 Ku , j  1, r ; m1  m0  0 ; mr  N ;
where K u is the amount of the counting on the u-th segment.</p>
      <p>We approximate these rows by cubic Hermitian splines so that there is a "bonded"
connection between the joints of the splines of these splines, which would
approximate the sum of the image counts at the corresponding points. To do this, we add the
following functional in the form:</p>
      <p>N N r
  [ y1(i)  S1(ti )]2  [ y2 (i)  S2 (ti )]2   [ y1( j)  y2 ( j)  S1(t j )  S2 (t j )]2 ,
i1 i1 j1
where: S1(t)  XA1 and S2 (t)  XA2 - cubic Hermitian splines that
approximate image lines y1(t) and y2 (t) ;
X - scheduling matrix;</p>
      <p>r</p>
      <p>A = { a j }j=1 - vectors of estimated parameters (ordinates of points where
spline fragments "gluing"), in this case weight   1.</p>
      <p>The value of the local Hermitian cubic spline at an arbitrary point is
calculated by the formula:</p>
      <p>S(  ) = a j-1 1 x(  )+ a j 2 x(  )+ a j+1 3 x(  )+ a j+2 4 x(  )
for  [ u j ,u j+1 ] , where</p>
      <p>k x(  ) - local functions of shape, k  1 4 ,
a j – the values of the knots’ ordinates, j  1,2,..., r .</p>
      <p>We will require the least squares (the least-squares method) condition to be
satisfied:   min . This requires a solution of the system of 2r equations:


 a1 j

 
a2 j
 0,</p>
      <p>j  1, r ;
 0,</p>
      <p>j  1, r.</p>
      <p>It is more expedient to solve this system in matrix form. Then the
requirements of the least-squares method (LSM):</p>
      <p>(Y  PA)T (Y  PA)  min ,
where:</p>
      <p>Y1 
Y  Y2  ,</p>
      <p>
        Y1  [ y1(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), y1(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),..., y1(N )]T ,
      </p>
      <p>
        Y2  [ y2 (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), y2 (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),..., y2 (N )]T
–
D 
vectors of initial time sequences;
D  [ y1(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )  y2 (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), y1(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )  y2 (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ),..., y1(N 1)  y2 (N 1)]T , dimension ( N *1) ;
2
A   AA12  , A1  [a11, a12 ,..., a1r ]T , A2  [a21, a22 ,..., a2r ]T – vectors of
ordinates of knots, where spline fragments "gluing";
      </p>
      <p> X  
P    X  , X – block-diagonal scheduling matrices whose columns
 X vuz X vuz </p>
      <p>k x(t),
are local spline functions
scheduling matrices whose columns are local spline functions thinned twice
k  1...4 [3, 4], X vuz – block-diagonal
for the number of knots N ; O – is a zero matrix of dimension N * r .</p>
      <p>2
Dimension of the matrix P – (2,5N * 2r) .</p>
      <p>Here is the classic LSM solution:</p>
      <p>A  (PT P)1 PT Y ,
and S1  XA1 , S2  XA2 – splines that have already been constructed to
allow for the "linked" connection between the knots where these splines "glue".
4</p>
      <sec id="sec-4-1">
        <title>Comparative analysis</title>
        <p>We will carry out the comparative analysis as follows:</p>
        <p>1) we approximate the rows of the matrices of all the color components of
the digital image presented below (Fig. 1) by cubic Hermitian splines with the
number of “gluing” knots N ;</p>
        <p>2
2) we calculate the difference R1 between the lines of the original image
and the resulting splines;</p>
        <p>3) we assign zero values to the R1 coefficients which are less by the
absolute value of a certain threshold;
4) we store non-zero values in the computer memory;
5) repeat the above steps, taking as the initial ordinates the knots of
splines, approximating the rows of the matrices of all the color components of
the digital image (Fig. 2);</p>
        <p>6) the same algorithm will be applied to the method proposed in this paper,
where splines are already constructed taking into account the "bonded" link
between the knots of these splines, which approximates the sum of the frames
of images at the appropriate points;</p>
        <p>7) we compare the compression coefficients at the same standard
deviations (SLE) from the original of the images reconstructed after compression
by these two methods (Fig. 3, Fig. 4).</p>
      </sec>
      <sec id="sec-4-2">
        <title>Conclusion</title>
        <p>
          The aim of this paper is not to develop a complete method for two-dimensional
compression of digital images. One-dimensional line compression revealed the advantages
of approximation by cubic Hermitian splines, taking into account the "bonded"
connection between the knots of these splines (Fig. 3) compared to the approximation
without taking into account such a connection (Fig. 2). We can come to the
conclusion that this approach is perspective for further development.
17. Jump up to:a b Unser, M.; Blu, T. (2003). "Mathematical properties of the JPEG2000
wavelet filters" (PDF). IEEE Transactions on Image Processing. 12 (
          <xref ref-type="bibr" rid="ref9">9</xref>
          ): 1080–
1090. doi:10.1109/TIP.2003.812329.
18. Sullivan, Gary (8–12 December 2003). "General characteristics and design considerations
for temporal subband video coding". ITU-T. Video Coding Experts Group. Retrieved 13
September 2019.
19. Bovik, Alan C. (2009). The Essential Guide to Video Processing. Academic Press.
        </p>
        <p>
          p. 355. ISBN 9780080922508.
20. Gall, Didier Le; Tabatabai, Ali J. (1988). "Sub-band coding of digital images using
symmetric short kernel filters and arithmetic coding techniques". ICASSP-88., International
Conference on Acoustics, Speech, and Signal Processing: 761–764
vol.2. doi:10.1109/ICASSP.1988.196696.
21. Swartz, Charles S. (2005). Understanding Digital Cinema: A Professional
Handbook. Taylor &amp; Francis. p. 147. ISBN 9780240806174.
22. Kasianov V. The Flight Modelling: Monography. –Kyiv: NAU, 2004.
23. Shutko M. Methods and means of increasing the reliability of measurement information
processing and control of parameters of radio-electronic systems for air traffic control //
Author's abstract. Diss. Dr. Tech. Sciences: 05.22.14 / KIIGA. - K., 1991.
24. Kasyanov V., Shutko V., Shelevitsky I. Spline approximation of analytically bound time
series.Vis. Nauk. - K .: NAU, 2001, No. 4 (
          <xref ref-type="bibr" rid="ref11">11</xref>
          ), pp. 117 - 120.
25. Shutko V. Spline approximation of estimates of correlation sequences of harmonic signals
// Visn. NAU, Kyiv, NAU, 2002, No. 1 (
          <xref ref-type="bibr" rid="ref12">12</xref>
          ), P. 73 - 77.
26. Odarchenko R., Abakumova A., Polihenko O., Gnatyuk S. Traffic offload improved
method for 4G/5G mobile network operator, Proceedings of 14th International Conference on
Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering
(TCSET-2018), pp. 1051-1054, 2018.
27. M. Zaliskyi, R. Odarchenko, S. Gnatyuk, Yu. Petrova. A. Chaplits, Method of traffic
monitoring for DDoS attacks detection in e-health systems and networks, CEUR
Workshop Proceedings, Vol. 2255, pp. 193-204, 2018.
        </p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <article-title>"Image Data Compression"</article-title>
          . http://user.engineering.uiowa.edu/~dip/lecture/DataCompression.html
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Nasir</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Natarajan</surname>
          </string-name>
          and
          <string-name>
            <given-names>K. R.</given-names>
            <surname>Rao</surname>
          </string-name>
          ,
          <article-title>"Discrete Cosine Transform,"</article-title>
          <source>IEEE Trans. Computers</source>
          ,
          <volume>90</volume>
          -
          <fpage>93</fpage>
          , Jan.
          <year>1974</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Burt</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Adelson</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <source>(1 April</source>
          <year>1983</year>
          ).
          <article-title>"The Laplacian Pyramid as a Compact Image Code"</article-title>
          .
          <source>IEEE Transactions on Communications</source>
          .
          <volume>31</volume>
          (
          <issue>4</issue>
          ):
          <fpage>532</fpage>
          -
          <lpage>540</lpage>
          .
          <source>CiteSeerX 10.1.1.54</source>
          .299. doi:
          <volume>10</volume>
          .1109/TCOM.
          <year>1983</year>
          .
          <volume>1095851</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Shao</surname>
            , Dan; Kropatsch,
            <given-names>Walter G.</given-names>
          </string-name>
          (
          <issue>February 3-5</issue>
          ,
          <year>2010</year>
          ). Špaček, Libor; Franc, Vojtěch (eds.).
          <article-title>"Irregular Laplacian Graph Pyramid" (PDF)</article-title>
          .
          <source>Computer Vision Winter Workshop 2010</source>
          . Nové Hrady, Czech Republic:
          <article-title>Czech Pattern Recognition Society</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Claude</given-names>
            <surname>Elwood Shannon</surname>
          </string-name>
          (
          <year>1948</year>
          ).
          <article-title>Alcatel-Lucent (ed</article-title>
          .).
          <article-title>"A Mathematical Theory of Communication" (PDF)</article-title>
          .
          <source>Bell System Technical Journal</source>
          .
          <volume>27</volume>
          (
          <issue>3-4</issue>
          ):
          <fpage>379</fpage>
          -
          <lpage>423</lpage>
          ,
          <fpage>623</fpage>
          -
          <lpage>656</lpage>
          . Retrieved 2019-
          <volume>04</volume>
          -21.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>David Albert Huffman</surname>
          </string-name>
          (
          <year>September 1952</year>
          ),
          <article-title>"A method for the construction of minimumredundancy codes" (PDF)</article-title>
          ,
          <source>Proceedings of the IRE</source>
          ,
          <volume>40</volume>
          (
          <issue>9</issue>
          ), pp.
          <fpage>1098</fpage>
          -
          <lpage>1101</lpage>
          , doi:10.1109/JRPROC.
          <year>1952</year>
          .273898
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>William</surname>
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Pratt</surname>
          </string-name>
          , Julius Kane, Harry C.
          <article-title>Andrews: "Hadamard transform image coding"</article-title>
          ,
          <source>in Proceedings of the IEEE 57.1</source>
          (
          <year>1969</year>
          ): Seiten 58-68
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <surname>Nasir</surname>
          </string-name>
          (
          <year>January 1991</year>
          ).
          <article-title>"How I Came Up With the Discrete Cosine Transform"</article-title>
          .
          <source>Digital Signal Processing</source>
          .
          <volume>1</volume>
          (
          <issue>1</issue>
          ):
          <fpage>4</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1016/
          <fpage>1051</fpage>
          -
          <lpage>2004</lpage>
          (
          <volume>91</volume>
          )
          <fpage>90086</fpage>
          -
          <lpage>Z</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9. "T.81
          <article-title>- Digital compression and coding of continuous-tone still images - requirements and guidelines"</article-title>
          .
          <source>CCITT. September 1992. Retrieved 12 July</source>
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <article-title>"The JPEG image format explained"</article-title>
          .
          <source>BT.com. BT Group. 31 May 2018. Retrieved 5 August</source>
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <article-title>"What Is a JPEG? The Invisible Object You See Every Day"</article-title>
          .
          <source>The Atlantic. 24 September 2013. Retrieved 13 September</source>
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Baraniuk</surname>
          </string-name>
          ,
          <source>Chris (15 October</source>
          <year>2015</year>
          ).
          <article-title>"Copy protections could come to JPEGs"</article-title>
          .
          <source>BBC News. BBC. Retrieved 13 September</source>
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <article-title>"The GIF Controversy: A Software Developer's Perspective"</article-title>
          .
          <source>Retrieved 26 May2015.</source>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. L. Peter
          <string-name>
            <surname>Deutsch</surname>
          </string-name>
          (May
          <year>1996</year>
          ).
          <source>DEFLATE Compressed Data Format Specification version 1</source>
          .3. IETF. p.
          <volume>1</volume>
          . sec.
          <source>Abstract. doi:10.17487/RFC1951. RFC 1951. Retrieved</source>
          <year>2014</year>
          -
          <volume>04</volume>
          -23.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Hoffman</surname>
          </string-name>
          ,
          <string-name>
            <surname>Roy</surname>
          </string-name>
          (
          <year>2012</year>
          ).
          <source>Data Compression in Digital Systems. Springer Science &amp; Business Media</source>
          . p.
          <fpage>124</fpage>
          . ISBN 9781461560319.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Taubman</surname>
          </string-name>
          , David; Marcellin,
          <string-name>
            <surname>Michael</surname>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>JPEG2000 Image Compression Fundamentals, Standards and Practice: Image Compression Fundamentals</article-title>
          ,
          <source>Standards and Practice. Springer Science &amp; Business Media. ISBN 9781461507994.</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>