Abstract
At present, the amount of information on power grid operation and maintenance monitoring image data is increasing, and the requirements for data compression are higher and higher. Based on the improved SPIHT image compression algorithm, this study presents the research of power grid data compression. First, the basic theory of image compression, and the principle of one-dimensional wavelet transform and two-dimensional wavelet transform are introduced. The development process, characteristics, and advantages of image coding are discussed. Then, the shortcomings of the SPIHT algorithm are analyzed, and the SPIHT coding is improved by parallel computation. The parallel wavelet transform algorithm based on the block idea and the parallel SPIHT coding algorithm based on the code tree are proposed in the data parallelism of the compression algorithm. At the same time, the data dependence between tasks in the process of SPIHT image compression coding is analyzed, and the task parallelism in the compression algorithm is realized by using the relative independence of tasks in different threshold coding. Finally, the application and simulation analysis of power grid data based on the SPIHT compression algorithm, the construction of power grid data model simulation, and the composition of two-dimensional power grid data images are carried out. Secondly, the obtained 2D power grid data image is compressed by the SPIHT algorithm and improved SPIHT algorithm, respectively, and the compression effect of the two algorithms on the power grid data image is compared. When the bit rate is 0.5, the compression effect of the improved SPIHT algorithm is 13.6506. When the bit rate is 1, the compression effect of the improved SPIHT algorithm is 18.9287. The results show that the improved SPIHT algorithm can compress the grid data to obtain better grid image quality.
1 Introduction
With the progress of science and technology and the development of modern society, electric energy has become an indispensable energy for human beings. A practical data compression method applicable to thousands of engineering applications is considered to rationally discard, store, and design a large number of leftovers in a large number of Shenli data to achieve real-time and accurate monitoring of the changes in various operating parameters in the power system [1]. It is monitored and controlled in real-time so that the failure can be quickly restored to the normal situation, to reduce the loss caused by power anomalies. At the same time, the causes of abnormal occurrences can be analyzed in detail, and corresponding technologies can be adopted to reduce the frequency of abnormal occurrences [2]. The technology of power data collection, compression, and storage of relevant power systems is an urgent problem to be solved. Using data compression, the information is stored and transmitted in the form of simple computer coding, which not only saves the computer storage space but also improves the transmission rate of the communication trunk, and makes it possible for the computer to process image information in real-time and play high-definition images or Blu-ray videos.
At present, Xiangjiu and Sen proposed an improved SPIHT algorithm using the large-top pile method, which optimized the importance test in SPIHT [3]. Aiming at the problem that the traditional multilevel tree set split-sort (SPIHT) algorithm for remote sensing image compression is slow due to the dynamic processing order depending on the image content, Ke et al. proposed an improved SPIHT algorithm for spatial-time delay integral charge coupled device (CCD) camera image compression [4]. Jianjun and Bo proposed a lossless image compression algorithm suitable for hardware implementation to solve the problems of difficult hardware implementation and the high cost of common embedded wavelet coding algorithms [5]. Based on the study of SPIHT, an image compression algorithm based on wavelet transform, Zhihong and Longmei proposed D-SPIHT, a distributed and parallel image compression algorithm based on SPIHT, which has the characteristics of low complexity, simple design, fast execution, and complete distributed and parallel execution [6,7].
Based on the improved SPIHT image compression algorithm, this study presents the research of power grid data compression. First, the basic theory of image compression, and the principle of one-dimensional wavelet transform and two-dimensional wavelet transform are introduced. The development process, characteristics, and advantages of image coding are discussed. The multi-resolution analysis of the wavelet and Mallat algorithm are summarized, the wavelet decomposition of the image is analyzed, and the number of decomposition layers and boundary extension of the image are discussed. Then, the classic SPIHT algorithm is summarized, and the spatial direction tree and the division of sets are introduced. Then, the shortcomings of the SPIHT algorithm are analyzed, and the SPIHT coding is improved by parallel computation. The parallel wavelet transform algorithm based on the block idea and the parallel SPIHT coding algorithm based on the code tree are proposed in the data parallelism of the compression algorithm. At the same time, the data dependence between tasks in the process of SPIHT image compression coding is analyzed, and the task parallelism in the compression algorithm is realized by using the relative independence of tasks in different threshold coding. Finally, the application and simulation analysis of power grid data based on the SPIHT compression algorithm, the construction of power grid data model simulation, and the composition of two-dimensional power grid data images are carried out. Secondly, the obtained 2D power grid data image is compressed by the SPIHT algorithm and improved SPIHT algorithm, respectively, and the compression effect of the two algorithms on the power grid data image is compared.
2 Wavelet transform and image compression algorithm
2.1 Wavelet transform
In signal analysis, we often use the time domain or frequency domain to describe the signal. Although the traditional Fourier transform can describe the characteristics of the signal well and accurately in the frequency domain space, it does not carry the information of the signal in the time domain [8]. Therefore, to study the spectral characteristics of a signal, it is necessary to obtain all the information of the signal in the time domain, and even the future information. However, in practice, we are more concerned with the spectrum of the signal over a specific period, which is not taken into account by the Fourier transform [9]. The frequency window of wavelet transform, a time node that can be adjusted, solves this problem well.
At the same time, the so-called “permissibility” condition is met.
where
where a is the expansion factor and b is the translation factor.
Assuming f(x) is a square-integrable function, the continuous wavelet transform of f(x) is defined as
Obviously, with the change in parameter a, the spectrum structure, window size, and shape of the continuous wavelet will change. When the signal frequency is low, the observation window becomes larger, and vice versa, the observation window becomes smaller, so the wavelet transform has a high resolution in the time (space) domain.
According to the admissibility condition of wavelet (1), it can be obtained that
The continuous wavelet function can be reconstructed by its continuous wavelet transform to obtain the inverse transformation.
In common practical applications, the continuous wavelet transform method is not used, because the computer does not have the function of performing continuous variable operations [10]. In use, we can discretize the continuous wavelet transform to form a transformation method that can run in the computation.
Then, the discrete binary wavelet transform of f(k) is
Accordingly, the inverse discrete binary wavelet transform can be obtained.
It can be seen that with the constant change in n, the information of different signals at different periods can be analyzed. As m becomes smaller, the corresponding frequency of the signal will gradually become higher, and more details of the signal can be observed.
Multiresolution is composed of subspaces that do not overlap each other and can form nested sequences.
where
The essence of multi-resolution analysis, in a physical sense, is to decompose the original signal into components of different frequency segments according to different needs, to facilitate subsequent analysis [11].
In 1987, Mallat proposed Mallat fast wavelet algorithm based on multi-resolution analysis, which can realize signal decomposition from fine to coarse and reconstruction from coarse to fine by adjusting the scale factor.
where
The following results are obtained:
Using equations (9), (10), and phase orthogonality, it is further obtained that
For the same reason
Define the operator
Then,
Iterating the above process over and over again, we get
Then, we can get
Iterating through this loop, we can get
This is Mallat’s algorithm. Equation (23) is called “wavelet decomposition.”
2.2 Image compression algorithm
If the Mallat multi-resolution tower decomposition algorithm is extended to the field of two-dimensional wavelet transform, the decomposition process of two-dimensional discrete wavelet transform can be completed through two steps of row processing and column processing, and the decomposition process is shown in Figure 1. First, each line of the near signal at stage j is regarded as a one-dimensional signal, which is filtered by a low-pass filter and high-pass filter h and g, respectively, and down-sampled. Then, each column of the two groups of signals obtained after line decomposition is regarded as a one-dimensional signal, and the low-pass and high-pass filters h and g are used to achieve column filtering and down-sampling processing, respectively. Finally, four groups of two-dimensional signals are obtained [11]. If we want to continue the decomposition, we need to process aj-1 by row and column again in the previous way, and so on. Finally, the Mallat multi-level tower decomposition algorithm of two-dimensional discrete wavelet transform is formed. The process of two-dimensional discrete wavelet inverse transformation is an inverse process with the decomposition process and its reconstruction process shown in Figure 1. The specific process will not be repeated here.

Decomposition and reconstruction process of 2D discrete wavelet transform.
The second-generation wavelet transform of the lifting format is a second-generation wavelet transform method based on the lifting format proposed by Sweldens and participated by Daubechies and others [12]. Compared with the traditional wavelet transform, the enhanced wavelet transform has the advantages of high operation speed, simple calculation, and less storage space. The promotion format mainly includes three processes: splitting, forecasting, and updating, and the reconstruction process is its inverse process.
Since CDF (9,7) enhanced wavelet transform has a linear phase, large vanishing moment, and good energy concentration, this work uses CDF (9,7) enhanced wavelet transform to decompose and reconstruct power quality signals [11].
The parameters in the figure are determined by the following:
where
2.3 Power grid data compression method based on image compression
The overall scheme of the three-phase power quality data compression method proposed in this work is shown in Figure 2. First, the three-phase power quality data in the three-phase coordinate system is converted into two-phase power quality data in the two-phase coordinate system and zero-sequence power quality data by dq () transformation. When the system operates symmetrically or the three-phase unbalance is light, the value of zero-sequence power quality is about zero [12]. Therefore, some coefficients in the zero-sequence power quality data obtained by the dq () transformation will be zero, which is more conducive to the coding after wavelet transformation and can achieve a higher compression ratio. Then, to further explore the periodic redundancy of power quality data, the transformed power quality data are converted into a two-dimensional matrix according to the integer multiple periods, the signal period is taken as a row and the sampling point is taken as a column. Then, digital image smoothing technology is used to blur the two-dimensional matrix [13]. Finally, data compression is carried out based on SPIHT encoding and the DEFLATE encoding algorithm of the two-dimensional wavelet transform image. Data reconstruction is the reverse process of data compression.

Data compression and reconstruction.
The three-phase voltage/current in the three-phase plane coordinate system ABC can be transformed into a set of mutually orthogonal two-phase voltage/current and zero-sequence voltage/current in the two-phase plane coordinate system dq by dq () transformation.
3 Parallelization of SPIHT image compression algorithm
3.1 Dependency analysis
Cyclic operation is a data structure algorithm rich in parallelism, and it always consumes most of the time during the algorithm execution [14]. The process of algorithm serialization is the process of migrating the parallelized part of the algorithm to the parallel machine for computation. Its essence is to carry out parallelism analysis on the transplanted loop body, which is one of the important components of serial algorithm parallelization. The goal is to find the loop body suitable for parallelization in the serial algorithm and keep the semantics of the parallel algorithm unchanged before and after modification, and the computation function is the same [15]. The execution efficiency of parallel algorithms is directly related to the adequacy of parallel analysis. The analysis of dependence on relation is the basis of parallelism analysis. Dependency analysis is the premise of the parallelization of serial algorithms. Only after analyzing the dependency of the algorithm can we design the corresponding parallel algorithm.
The data dependency diagram is shown in Figure 3. As can be seen from the figure, in the splitting stage, the execution of each splitting process only has a time dependence. In the prediction phase, prediction task 1 depends on the output of split task 1 and split task 2 [16]. The dependency of prediction task 1 on split task 1 is strong data dependency, and the dependency of prediction task 1 on split task 2 is weak data dependency. In the update phase, update task 2 depends on prediction task 1 and prediction task 2. The dependency of update task 2 on prediction task 2 is strong, and the dependency of prediction task 1 is weak.

Dependency diagram of wavelet transform and SPIHT encoded data.
Based on the above analysis of the integer 5/3 wavelet transform data dependency graph, we can eliminate the weak data dependency in the graph using data prefetching [17]. In addition, the time dependence can be eliminated directly during parallelization. Before the execution of prediction task 1, even sequence pixel 2 is prefetched, and before the execution of update task 1, odd sequence coefficient 0 is prefetched. In this way, there is no data dependence between the two tasks of wavelet coefficient transformation. In this way, the two tasks can be processed in parallel to realize the parallelization of the serial integer 5/3 wavelet transform algorithm.
Figure 3 shows the data dependencies during SPIHT encoding. As can be seen from the figure, because of the existence of the sequence table, different coding trees have data dependence in the coding process. To eliminate this kind of data dependency, the method of eliminating the order table can be adopted, and the removal of the order table will no longer have data dependency between various coding trees. In this way, the encoding process of different coding trees is completely independent, so that the parallelization process of serial SPIHT encoding with coding tree as parallel unit can be realized. At the same time, it can also be seen that the code stream output of each code tree is completely independent. However, the compressed streams of different code trees of the original SPIHT algorithm are output in a specific order, which requires a stream reorganization process in the subsequent stage of parallelization, so that the output streams of the parallel SPIHT encoding are the same as those of the original SPIHT algorithm.
3.2 Parallel SPIHT image compression algorithm
The parallel integer 5/3 wavelet transform is divided into three stages: preprocessing, data transformation, and post-processing. Among them, the pre-processing stage is divided into data segmentation and data expansion, whose purpose is to provide parallel data sources for parallel data transformation. The post-processing stage includes data concatenation and data recombination, through which the final two-dimensional wavelet transform coefficients can be generated.
It mainly includes two parts: data partitioning and data extension. First, the original image data is partitioned into equal rows and columns according to the image size and hardware resources, and then different expansion methods are adopted according to the location of the edge of the data block [18]. Specifically, if the edge of the data block happens to be the edge of the image, then two pixels are extended in a symmetric continuation manner. If the edge of the data block is inside the image, two pixels are taken from each of its adjacent data blocks for expansion.
The expanded data block is the basic unit for the implementation of the 5/3 wavelet transform parallel algorithm. The two-pixel extension of data blocks enables the transformation between blocks to be carried out independently, avoiding inter-block communication, which is also a prerequisite for the implementation of parallel wavelet algorithms [19].
The two-dimensional wavelet transform of each extended data block is completed by one-dimensional row wavelet transform and one-dimensional column wavelet transform in turn. First, the parallel prediction process of the odd sequence is carried out, and then the parallel update process of the dual sequence is carried out, thus completing a one-dimensional 5/3 wavelet transformation process [20]. In the process of parallel prediction and update, the prediction of each element in the odd sequence and the update of each element in the even sequence are executed in parallel.
Post-processing mainly includes two processes data concatenation and data reorganization. Data splicing is to splice the transform coefficients of each data block into wavelet transform coefficients of the same dimension as the original image in parallel. The purpose of data reorganization is to concentrate the coefficients of each frequency sub-band. After post-processing, the final 5/3 wavelet transform coefficient can be obtained for the subsequent parallel SPIHT coding process.
The parallelism of the SPIHT encoding algorithm can be analyzed from two levels. First, there is the overlap of tasks in different value coding processes, which is coarse-grained parallelism at the task level; then there is the parallelism of different code trees in specific value coding processes, which is fine-grained parallelism at the data level.
The data level parallelism in parallel SPIHT coding is encoded by using a code tree as a parallel unit. It can be seen from the coding tree that the coefficient of each high-frequency sub-band has four child nodes in the next level of the high-frequency sub-band. It should be noted that the low-frequency sub-band has no child nodes, i.e., the coefficient of the low-frequency sub-band is a coding tree with only root nodes. The data-level parallelization process of the parallel SPIHT encoding algorithm is described in detail in this work.
Removal of order tables: Three order tables, LIP, LIS, and LSP, were removed, and three matrices with the same dimension as the wavelet decomposition coefficients were introduced, denoted as AIP, AIS, and ASP, respectively. The purpose of this is to remove the data dependency between different coding trees so that the coding process of different coding trees can be carried out in parallel and independently. At the same time, the dynamic coding process of coefficients in the same wavelet level is transformed into a static coding process, which provides the basis for data-level parallelization.
A new way of transmitting position information is introduced: The original serial algorithm implicitly transmits the ranking information of the coding coefficients through the order table, but the matrix itself cannot implicitly transmit the position information. The solution is to add serial and parallel Morton scanning methods to implicitly transmit location information. Among them, the parallel Morton scan is used to generate stream packets corresponding to a single wavelet coefficient in parallel, and the serial Morton scan is used to organize the stream generated by serially encoding each wavelet coefficient and output the stream, which is equivalent to implicitly transmitting the position information of the encoding coefficient.
Adding the node sorting process: Changing the transmission mode of location information also changes the wavelet coefficient processing order of the original algorithm. It is equivalent to adding the sorting process of the nodes in the order table based on the original algorithm so that the important nodes of the high-level wavelet coefficients will always be coded preferentially than the important nodes of the low-level wavelet coefficients.
In the stage of fine coding and sequencing coding, the parallelization process based on the code tree is adopted. Parallel Morton scanning mode is adopted for parallel coding between different coding trees, and the stream packet corresponding to each wavelet coefficient is output at the same time. The whole process of unpacking is serial, and the code stream is unpacked and reassembled in serial according to the serial Morton scanning mode and the organizational structure of the code stream. Table 1 explains the structure of the stream packet. In the process of parallel SPIHT coding with specific rush values, the stream packet corresponding to each wavelet coefficient is output according to Table 1. In the process of stream organization, the stream packet is unpacked according to Table 1 and the final stream is output.
Code stream packet structure interpretation table
| Encoding type | Place | Place value | Interpret | Output operation |
|---|---|---|---|---|
| Sort coding | 0–1 | 00 | uncoded | No output |
| 01 | Code, greater than the threshold | 0 | ||
| AIP | 10 | Code, greater than the threshold, the sign is negative | 10 | |
| 11 | Code, greater than the threshold, the sign is positive | 11 | ||
| Sort coding | 2 | 0 | uncoded, bit3–11 is invalid | No output |
| 1 | Code | To be exported | ||
| 3 | 0 | Type D sets are not important, bit4–11 is invalid | 0 | |
| 1 | Type D sets are important and encode four nodes | 1 | ||
| AIS_D | 4–5 | Same as AIP sort encoding | ||
| 6–7 | ||||
| 8–9 | ||||
| 10–11 | ||||
| Sort coding | 12 | 0 | uncoded, bit13 is invalid | No output |
| 1 | Code | To be exported | ||
| AIS_L | 13 | 0 | L-sets are not important | 0 |
| 1 | L-type sets are important | 1 | ||
| Detailed coding | 14 | 0 | Uncoded, bit15 is invalid | No output |
| 1 | Code | To be exported | ||
| ASP | 15 | 0 | The refinement bit is 0 | 0 |
| 1 | The refinement bit is 1 | 1 | ||
4 Application of SPIHT data compression
4.1 Grid data model
As can be seen from Figure 4, the power grid model mainly includes generators, transformers, LC filters, loads, transmission lines, oscilloscopes, and other components. The current, voltage, active power, reactive power, frequency, and phase angle values of the six nodes 1, 2, 3, 4, 6, 8 are monitored and output as power grid system data for the SPIHT data compression method.

Grid model structure.
Data signal processing and monitoring is an important technology. It is often used in conjunction with a data oscilloscope to display the entire process and results. At present, some studies are trying to combine integrated circuit technology with a digital oscilloscope, including the use of DSP and FPGA technology, to give full play to the high flexibility of hardware and software combination structure, high-speed real-time sampling updates the digital logic structure and program and has a strong advantage of universality.
Data acquisition (also known as digitization) in a digital oscilloscope consists of three main operations: sampling, quantization, and encoding. Sampling is the exponential sampling of the oscilloscope’s voltage signal within a fixed time interval, and the analog signal is discrete with time. Quantization refers to the amplitude discretization of analog signals, while encoding refers to the conversion of quantized discrete digital signals into binary data. Usually, quantization and coding are done at the same time. The digitization process of the digital oscilloscope is mainly completed by an A/D converter. In the conversion process, the sampling and holding circuit of the A/D converter ensures the accuracy of the conversion because the circuit has two working states of sampling and holding, which can collect the instantaneous value of the analog input voltage at a certain time, and keep the output voltage constant during the conversion process to ensure the smooth completion of the conversion process.
The basic principle of digital oscilloscope signal sampling follows the sampling theorem. Signal sampling methods can be divided into real-time sampling and non-real-time sampling. Non-real-time sampling can be divided into random equivalent sampling and sequential sampling. The sampling theorem is an explanation of the relationship between the sampling frequency and the signal spectrum. When the sampling frequency is more than twice the maximum frequency of the original signal, the sampled digital signal can completely retain the information in the original signal. Therefore, the determination of sampling frequency plays a very important role in the signal sampling of digital oscilloscopes. In addition, to improve the real-time sampling rate of the whole machine, time alternate parallel sampling technology is often used. The principle of this method is to concatenate multiple ADCs at a low sampling rate, and then use the phase difference of each ADC to continuously sample the original signal. Finally, all the sampled signals are arranged according to the sampling order to obtain the final sampling data result. In addition, the waveform capture rate of the digital oscilloscope is also an important index.
Waveform capture rate is the number of waveforms captured by an exponential word oscilloscope in unit time, which is related to the time of data oscilloscope acquisition and processing of waveform data. Since numerical algorithms can greatly reduce waveform capture rate in DSP processors, interpolation can shorten data processing time in hardware, to achieve the effect of improving the waveform capture rate.
4.2 Hardware implementation of SPIHT coding algorithm
SPIHT coding algorithm is a multilevel tree set split coding algorithm, it defines a special tree structure of the wavelet transform coefficient of the image and then uses the tree structure as the basis for encoding and decoding. The SPIHT coding algorithm has been introduced in the previous chapter, This study introduces the FPGA implementation process of the SPIHT algorithm encoder.
The SPIHT encoder implemented in this paper is controlled by a state machine, the initial state is IDLE, and the SPIHT encoder does not work. When the DWT transformation is completed, i.e., when dwt_done is 1, the next state is entered, i.e., the INIT state is initialized. When the initialization is complete, the LIP entry and LIS table are filled, and init_done is pulled higher, the LIP state is entered. After the scanning of the LIP entry is completed, the lip_done signal is sent, the LIS state is entered, and the scanning of the LIS entry is started. The final EXOU state is the fine scanning state after LIS scanning is completed. If the encoding is completed, the IDLE state will be returned. If not, the threshold value will be reduced by one, and the LIP state will be returned for the next stage of encoding scanning. The implementation of each state in the state machine is explained in detail.
The initialization involves initializing the threshold value Tn and filling the LIP and LIS entries. Since the LSP is empty during initialization, it is not processed. The initial threshold is set here to 8, and subsequent updates to the threshold are placed in the Fine Scan section. There are two storage media options for LIP and LIS entries, one is RAM and the other is FIFO. However, scanning entries are performed according to the sequence of storage in the table. Deletion operations are often performed during scanning. We hope that subsequent data can be automatically replenished after deletion so that subsequent data scanning is not affected. If RAM is used to store LIP and LIS entries, then when any entry in the table is deleted, subsequent data will need to be moved forward by one address. This undoubtedly increases the difficulty and complexity of the system control. The FIFO (First In, First Out) structure is just in line with the working logic of LIP and LIS entries, each reads a data, that is, the default deletion of the data, and the subsequent data automatically complete. If you do not want to delete the current data, add the data at the end of the entry. The writing of data is also stored in sequence. Therefore, FIFO is the most suitable entry for LIS and LIP. As for the critical data stored by LSP, it is only increased, and it needs to be read in cycles, so RAM is more suitable.
Compared with the previous modules, the structure of the LIS sorting module is more complex, including the processing of two different types of entries, namely, Type A and Type B, and each type of entry processing is different. Its main work is to scan the child node and the grandson node judges the importance and deals with the results of different important judgments accordingly.
4.3 Simulation analysis
First, the original power grid data obtained from the output of the simulation model is read. To facilitate the acquisition of experimental data, the power grid system running time within 0–1 s is set in the Simulink simulation model. It can be seen from the experimental results that there are about 13,485 × 257 power grid data outputs within 0–1 s. To adapt the SPIHT compression method, this study converts the data within 1 s into several 256 × 256 matrix data blocks. It can be seen from the calculation that a 256 × 256 matrix data block is about 0.02 s of acquired power grid data. The converted 256 × 256 2D power grid data obtained every 002 s is applied to the classical 2D SPIHT image processing compression method introduced in this study to compress the power grid data (Table 2).
Comparison of the compression effects of the two algorithms on power grid data images
| Bit rate | SPIHT (bit/s) | Parallel SPIHT (bit/s) |
|---|---|---|
| 0.25 | 11.4518 | 11.7534 |
| 0.5 | 13.0513 | 13.6506 |
| 0.75 | 16.0344 | 18.2189 |
| 1 | 18.4071 | 18.9287 |
Experimental data show that both the SPIHT compression algorithm and the improved SPIHT algorithm have a compression effect on the two-dimensional network data, and the peak signal to noise ratio (PSNR) of the improved SPIHT algorithm is higher than that of the original SPIHT algorithm at each bit rate. The experimental results show that the improved SPIHT algorithm can compress the grid data to obtain better grid image quality.
Information entropy is used to evaluate the randomness and unpredictability of pixel distribution. To evaluate the correlation between the plaintext image and the ciphertext image, 5,000 pairs of adjacent pixels are randomly selected from the plaintext image and the ciphertext image in different directions, and the corresponding r xy is calculated. Figure 5 shows the correlation distribution diagram of the R channel of the plaintext Lena image and the corresponding ciphertext image.

Correlation distribution of adjacent pixels in image R channel.
As shown in Figure 5, the horizontal, vertical, and diagonal directions of the R channel in the plaintext Lena image are all positively correlated, basically conforming to the y = x function relationship. The points of adjacent pixels in the plaintext image are centrally distributed near the x-line. The points of adjacent pixels of the ciphertext image are distributed in the entire two-dimensional plane, indicating that the algorithm greatly eliminates the r xy of adjacent pixels of the plaintext image, and there is no correlation between adjacent pixels of the ciphertext image.
By setting the initial value and conducting a MATLAB simulation experiment, the trajectory diagram of the random sequence is obtained, as shown in Figure 6. It shows that the output sequence directly generated by the SPIHT compression algorithm has strong randomness and its value changes without regularity.

Trajectory diagram and time change of random sequence.
5 Conclusion
Aiming at the problem of data compression of power grid operation and maintenance monitoring images, this study proposes a data compression method based on the SPIHT image compression algorithm of parallel computing. This study summarizes the classic SPIHT algorithm of image compression, introduces the spatial direction tree and the division of sets, analyzes the shortcomings of the SPIHT algorithm, and improves the SPIHT coding by using parallel computing. The parallel wavelet transform algorithm based on the block idea and the parallel SPIHT coding algorithm based on the code tree are proposed in the data parallelism of the compression algorithm. Specific conclusions are as follows.
This study uses image smoothing technology to process two-dimensional power-quality data. It has the advantages of fast operation speed, small memory consumption, simple calculation, and simple inverse transformation. Based on SPIHT coding and the DEFLATE coding algorithm, the wavelet coefficients after the two-dimensional wavelet transform are compressed. The scheme has a good compression effect, and the compression performance can be flexibly adjusted according to the actual situation.
A parallel SPIHT image compression algorithm for GPU implementation is proposed. The whole parallel algorithm includes two parts: data parallel and task parallel. In this parallel algorithm, the parallel wavelet transform based on block idea and the parallel SPIHT coding based on code tree is the data parallel part of the compression algorithm, and the overlap of the generated stream and organized stream in the coding process of different threshold values is the task parallel part of the compression algorithm.
Simulation shows that both the SPIHT compression algorithm and the improved SPIHT algorithm have compression effects on the two-dimensional power network data, and the PSNR of the improved SPIHT algorithm is higher than that of the original SPIHT algorithm at each bit rate. The experimental results show that the improved SPIHT algorithm can compress the grid data to obtain better grid image quality.
The use of different scale wavelet functions in the wavelet transform will also have a great impact on the compression effect. Therefore, we can continue to explore the influence of different wavelet functions on the compression performance of power grid data and optimize the selection of compression. This study only discusses the coding situation. In the actual process, the information encoding mode of the image should be determined by the image itself. If it is limited to one kind of coding, it will be concise for the operating system. However, the compression ratio of different images cannot guarantee the optimal, and it is not the best way to facilitate the channel transmission. Moreover, static coding is adopted, and further work should be carried out around improving the compression rate and adopting adaptive coding.
-
Funding information: State Grid Jibei Electric Power Co., Ltd (No.520184220001).
-
Author contributions: Min Liu researched the parallelization of SPIHT algorithm and wrote the paper; Guoliang Zhou was responsible for improving SPIHT application in power grid and simulation experiment; Hongxu Wang and Yi Zheng were responsible for data processing and analysis.
-
Conflict of interest: The authors declare that there is no conflict of interest.
-
Data availability statement: Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.
References
[1] Zhang N, Jin L, Wu Y, Zhang K. An improved fast SPIHT image compression algorithm for aerial applications. J Multimed. 2011;20(5):17–8.10.4304/jmm.6.6.494-501Search in Google Scholar
[2] Li F, Krivenko S, Lukin V. Two-step providing of desired quality in lossy image compression by SPIHT. Radioelectron Computer Syst. 2020;18(2):22–32.10.32620/reks.2020.2.02Search in Google Scholar
[3] Xiangjiu C, Sen L. An improved SPIHT algorithm based on large top pile. J Jilin Univ (Eng Technol Ed). 2016;46(3):865–9 (in Chinese).Search in Google Scholar
[4] Ke Z, Limin D, Jin L, Shuangli H, Longxu J. An improved SPIHT algorithm for spatial CCD image compression. Optoelectron Laser. 2013;24(6):1219–24 (in Chinese).Search in Google Scholar
[5] Jianjun W, Bo L. Lossless image compression for hardware implementation. Opt Precis Eng. 2011;19(4):922–8 (in Chinese).10.3788/OPE.20111904.0922Search in Google Scholar
[6] Zhihong X, Yihan X, Tao H, Liang G. Improvement of SPIHT image compression algorithm based on WBCT transform. J Harbin Eng Univ. 2010;31(11):1519–23 (in Chinese).Search in Google Scholar
[7] Longmei Z, Wei L, Haoshan S. A distributed image compression algorithm for multi-hop WMSNs. J Northwest Polytech Univ. 2010;5:695–9.Search in Google Scholar
[8] Kaur C, Budhiraja S. Improvements of SPIHT in image compression-survey. Int J Emerg Technol Adv Eng. 2013;3(1):652–6.Search in Google Scholar
[9] Farmonov N, Amankulova K, Szatmári J, Sharifi A, Abbasi-Moghadam D, Nejad SMM, et al. Crop type classification by DESIS hyperspectral imagery and machine learning algorithms. IEEE J Sel Top Appl Earth Observ Remote Sens. 2023;16:1576–88.10.1109/JSTARS.2023.3239756Search in Google Scholar
[10] ZainEldin H, Elhosseini MA, Ali HA. Image compression algorithms in wireless multimedia sensor networks: A survey. Ain Shams Eng J. 2015;6(2):481–90.10.1016/j.asej.2014.11.001Search in Google Scholar
[11] Rema NR, Oommen BA, Mythili P. Image compression using SPIHT with modified spatial orientation trees. Procedia Computer Sci. 2015;46:1732–8.10.1016/j.procs.2015.02.121Search in Google Scholar
[12] NirmalRaj S. SPIHT: a set partitioning in hierarchical trees algorithm for image compression. Contemp Eng Sci. 2015;8(6):263–70.10.12988/ces.2015.519Search in Google Scholar
[13] Zhang H, Wang XQ, Sun YJ, Wang XY. A novel method for lossless image compression and encryption based on LWT, SPIHT and cellular automata. Signal Process Image Commun. 2020;84:115829.10.1016/j.image.2020.115829Search in Google Scholar
[14] Srikanth S, Meher S. Compression efficiency for combining different embedded image compression techniques with Huffman encoding. 2013 International Conference on Communication and Signal Processing. IEEE; 2013. p. 816–20.10.1109/iccsp.2013.6577170Search in Google Scholar
[15] Liu P, Li G. An improved SPIHT algorithm for image compression in low bit rate. Commun Netw. 2013;5(3):245–8.10.4236/cn.2013.53B2045Search in Google Scholar
[16] Panahi M, Yariyan P, Rezaie F, Kim SW, Sharifi A, Alesheikh AA, et al. Spatial modeling of radon potential mapping using deep learning algorithms. Geocarto Int. 2022;37(25):9560–82.10.1080/10106049.2021.2022011Search in Google Scholar
[17] Kamargaonkar C, Sharma M. Hybrid medical image compression method using SPIHT algorithm and Haar wavelet transform. 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT). IEEE; 2016. p. 897–900.10.1109/ICEEOT.2016.7754817Search in Google Scholar
[18] Al-Janabi AK, Al-Musawi HK, Harbi YJ. An efficient and highly scalable listless SPIHT image compression framework. J Appl Res Technol. 2022;20(2):173–87.10.22201/icat.24486736e.2022.20.2.1269Search in Google Scholar
[19] Nasrullah, Sang J, Akbar MA, Cai B, Xiang H, Hu H. Joint image compression and encryption using IWT with SPIHT, Kd-tree and chaotic maps. Appl Sci. 2018;8(10):1963.10.3390/app8101963Search in Google Scholar
[20] Muthukumaran N, Ravi R. Hardware implementation of architecture techniques for fast efficient lossless image compression system. Wirel Personal Commun. 2016;90:1291–315.10.1007/s11277-016-3391-9Search in Google Scholar
© 2024 the author(s), published by De Gruyter
This work is licensed under the Creative Commons Attribution 4.0 International License.
Articles in the same Issue
- Research Articles
- A study on intelligent translation of English sentences by a semantic feature extractor
- Detecting surface defects of heritage buildings based on deep learning
- Combining bag of visual words-based features with CNN in image classification
- Online addiction analysis and identification of students by applying gd-LSTM algorithm to educational behaviour data
- Improving multilayer perceptron neural network using two enhanced moth-flame optimizers to forecast iron ore prices
- Sentiment analysis model for cryptocurrency tweets using different deep learning techniques
- Periodic analysis of scenic spot passenger flow based on combination neural network prediction model
- Analysis of short-term wind speed variation, trends and prediction: A case study of Tamil Nadu, India
- Cloud computing-based framework for heart disease classification using quantum machine learning approach
- Research on teaching quality evaluation of higher vocational architecture majors based on enterprise platform with spherical fuzzy MAGDM
- Detection of sickle cell disease using deep neural networks and explainable artificial intelligence
- Interval-valued T-spherical fuzzy extended power aggregation operators and their application in multi-criteria decision-making
- Characterization of neighborhood operators based on neighborhood relationships
- Real-time pose estimation and motion tracking for motion performance using deep learning models
- QoS prediction using EMD-BiLSTM for II-IoT-secure communication systems
- A novel framework for single-valued neutrosophic MADM and applications to English-blended teaching quality evaluation
- An intelligent error correction model for English grammar with hybrid attention mechanism and RNN algorithm
- Prediction mechanism of depression tendency among college students under computer intelligent systems
- Research on grammatical error correction algorithm in English translation via deep learning
- Microblog sentiment analysis method using BTCBMA model in Spark big data environment
- Application and research of English composition tangent model based on unsupervised semantic space
- 1D-CNN: Classification of normal delivery and cesarean section types using cardiotocography time-series signals
- Real-time segmentation of short videos under VR technology in dynamic scenes
- Application of emotion recognition technology in psychological counseling for college students
- Classical music recommendation algorithm on art market audience expansion under deep learning
- A robust segmentation method combined with classification algorithms for field-based diagnosis of maize plant phytosanitary state
- Integration effect of artificial intelligence and traditional animation creation technology
- Artificial intelligence-driven education evaluation and scoring: Comparative exploration of machine learning algorithms
- Intelligent multiple-attributes decision support for classroom teaching quality evaluation in dance aesthetic education based on the GRA and information entropy
- A study on the application of multidimensional feature fusion attention mechanism based on sight detection and emotion recognition in online teaching
- Blockchain-enabled intelligent toll management system
- A multi-weapon detection using ensembled learning
- Deep and hand-crafted features based on Weierstrass elliptic function for MRI brain tumor classification
- Design of geometric flower pattern for clothing based on deep learning and interactive genetic algorithm
- Mathematical media art protection and paper-cut animation design under blockchain technology
- Deep reinforcement learning enhances artistic creativity: The case study of program art students integrating computer deep learning
- Transition from machine intelligence to knowledge intelligence: A multi-agent simulation approach to technology transfer
- Research on the TF–IDF algorithm combined with semantics for automatic extraction of keywords from network news texts
- Enhanced Jaya optimization for improving multilayer perceptron neural network in urban air quality prediction
- Design of visual symbol-aided system based on wireless network sensor and embedded system
- Construction of a mental health risk model for college students with long and short-term memory networks and early warning indicators
- Personalized resource recommendation method of student online learning platform based on LSTM and collaborative filtering
- Employment management system for universities based on improved decision tree
- English grammar intelligent error correction technology based on the n-gram language model
- Speech recognition and intelligent translation under multimodal human–computer interaction system
- Enhancing data security using Laplacian of Gaussian and Chacha20 encryption algorithm
- Construction of GCNN-based intelligent recommendation model for answering teachers in online learning system
- Neural network big data fusion in remote sensing image processing technology
- Research on the construction and reform path of online and offline mixed English teaching model in the internet era
- Real-time semantic segmentation based on BiSeNetV2 for wild road
- Online English writing teaching method that enhances teacher–student interaction
- Construction of a painting image classification model based on AI stroke feature extraction
- Big data analysis technology in regional economic market planning and enterprise market value prediction
- Location strategy for logistics distribution centers utilizing improved whale optimization algorithm
- Research on agricultural environmental monitoring Internet of Things based on edge computing and deep learning
- The application of curriculum recommendation algorithm in the driving mechanism of industry–teaching integration in colleges and universities under the background of education reform
- Application of online teaching-based classroom behavior capture and analysis system in student management
- Evaluation of online teaching quality in colleges and universities based on digital monitoring technology
- Face detection method based on improved YOLO-v4 network and attention mechanism
- Study on the current situation and influencing factors of corn import trade in China – based on the trade gravity model
- Research on business English grammar detection system based on LSTM model
- Multi-source auxiliary information tourist attraction and route recommendation algorithm based on graph attention network
- Multi-attribute perceptual fuzzy information decision-making technology in investment risk assessment of green finance Projects
- Research on image compression technology based on improved SPIHT compression algorithm for power grid data
- Optimal design of linear and nonlinear PID controllers for speed control of an electric vehicle
- Traditional landscape painting and art image restoration methods based on structural information guidance
- Traceability and analysis method for measurement laboratory testing data based on intelligent Internet of Things and deep belief network
- A speech-based convolutional neural network for human body posture classification
- The role of the O2O blended teaching model in improving the teaching effectiveness of physical education classes
- Genetic algorithm-assisted fuzzy clustering framework to solve resource-constrained project problems
- Behavior recognition algorithm based on a dual-stream residual convolutional neural network
- Ensemble learning and deep learning-based defect detection in power generation plants
- Optimal design of neural network-based fuzzy predictive control model for recommending educational resources in the context of information technology
- An artificial intelligence-enabled consumables tracking system for medical laboratories
- Utilization of deep learning in ideological and political education
- Detection of abnormal tourist behavior in scenic spots based on optimized Gaussian model for background modeling
- RGB-to-hyperspectral conversion for accessible melanoma detection: A CNN-based approach
- Optimization of the road bump and pothole detection technology using convolutional neural network
- Comparative analysis of impact of classification algorithms on security and performance bug reports
- Cross-dataset micro-expression identification based on facial ROIs contribution quantification
- Demystifying multiple sclerosis diagnosis using interpretable and understandable artificial intelligence
- Unifying optimization forces: Harnessing the fine-structure constant in an electromagnetic-gravity optimization framework
- E-commerce big data processing based on an improved RBF model
- Analysis of youth sports physical health data based on cloud computing and gait awareness
- CCLCap-AE-AVSS: Cycle consistency loss based capsule autoencoders for audio–visual speech synthesis
- An efficient node selection algorithm in the context of IoT-based vehicular ad hoc network for emergency service
- Computer aided diagnoses for detecting the severity of Keratoconus
- Improved rapidly exploring random tree using salp swarm algorithm
- Network security framework for Internet of medical things applications: A survey
- Predicting DoS and DDoS attacks in network security scenarios using a hybrid deep learning model
- Enhancing 5G communication in business networks with an innovative secured narrowband IoT framework
- Quokka swarm optimization: A new nature-inspired metaheuristic optimization algorithm
- Digital forensics architecture for real-time automated evidence collection and centralization: Leveraging security lake and modern data architecture
- Image modeling algorithm for environment design based on augmented and virtual reality technologies
- Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks
- High-resolution image processing and entity recognition algorithm based on artificial intelligence
- Review Articles
- Transformative insights: Image-based breast cancer detection and severity assessment through advanced AI techniques
- Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
- Applications of integrating artificial intelligence and big data: A comprehensive analysis
- A systematic review of symbiotic organisms search algorithm for data clustering and predictive analysis
- Modelling Bitcoin networks in terms of anonymity and privacy in the metaverse application within Industry 5.0: Comprehensive taxonomy, unsolved issues and suggested solution
- Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations
Articles in the same Issue
- Research Articles
- A study on intelligent translation of English sentences by a semantic feature extractor
- Detecting surface defects of heritage buildings based on deep learning
- Combining bag of visual words-based features with CNN in image classification
- Online addiction analysis and identification of students by applying gd-LSTM algorithm to educational behaviour data
- Improving multilayer perceptron neural network using two enhanced moth-flame optimizers to forecast iron ore prices
- Sentiment analysis model for cryptocurrency tweets using different deep learning techniques
- Periodic analysis of scenic spot passenger flow based on combination neural network prediction model
- Analysis of short-term wind speed variation, trends and prediction: A case study of Tamil Nadu, India
- Cloud computing-based framework for heart disease classification using quantum machine learning approach
- Research on teaching quality evaluation of higher vocational architecture majors based on enterprise platform with spherical fuzzy MAGDM
- Detection of sickle cell disease using deep neural networks and explainable artificial intelligence
- Interval-valued T-spherical fuzzy extended power aggregation operators and their application in multi-criteria decision-making
- Characterization of neighborhood operators based on neighborhood relationships
- Real-time pose estimation and motion tracking for motion performance using deep learning models
- QoS prediction using EMD-BiLSTM for II-IoT-secure communication systems
- A novel framework for single-valued neutrosophic MADM and applications to English-blended teaching quality evaluation
- An intelligent error correction model for English grammar with hybrid attention mechanism and RNN algorithm
- Prediction mechanism of depression tendency among college students under computer intelligent systems
- Research on grammatical error correction algorithm in English translation via deep learning
- Microblog sentiment analysis method using BTCBMA model in Spark big data environment
- Application and research of English composition tangent model based on unsupervised semantic space
- 1D-CNN: Classification of normal delivery and cesarean section types using cardiotocography time-series signals
- Real-time segmentation of short videos under VR technology in dynamic scenes
- Application of emotion recognition technology in psychological counseling for college students
- Classical music recommendation algorithm on art market audience expansion under deep learning
- A robust segmentation method combined with classification algorithms for field-based diagnosis of maize plant phytosanitary state
- Integration effect of artificial intelligence and traditional animation creation technology
- Artificial intelligence-driven education evaluation and scoring: Comparative exploration of machine learning algorithms
- Intelligent multiple-attributes decision support for classroom teaching quality evaluation in dance aesthetic education based on the GRA and information entropy
- A study on the application of multidimensional feature fusion attention mechanism based on sight detection and emotion recognition in online teaching
- Blockchain-enabled intelligent toll management system
- A multi-weapon detection using ensembled learning
- Deep and hand-crafted features based on Weierstrass elliptic function for MRI brain tumor classification
- Design of geometric flower pattern for clothing based on deep learning and interactive genetic algorithm
- Mathematical media art protection and paper-cut animation design under blockchain technology
- Deep reinforcement learning enhances artistic creativity: The case study of program art students integrating computer deep learning
- Transition from machine intelligence to knowledge intelligence: A multi-agent simulation approach to technology transfer
- Research on the TF–IDF algorithm combined with semantics for automatic extraction of keywords from network news texts
- Enhanced Jaya optimization for improving multilayer perceptron neural network in urban air quality prediction
- Design of visual symbol-aided system based on wireless network sensor and embedded system
- Construction of a mental health risk model for college students with long and short-term memory networks and early warning indicators
- Personalized resource recommendation method of student online learning platform based on LSTM and collaborative filtering
- Employment management system for universities based on improved decision tree
- English grammar intelligent error correction technology based on the n-gram language model
- Speech recognition and intelligent translation under multimodal human–computer interaction system
- Enhancing data security using Laplacian of Gaussian and Chacha20 encryption algorithm
- Construction of GCNN-based intelligent recommendation model for answering teachers in online learning system
- Neural network big data fusion in remote sensing image processing technology
- Research on the construction and reform path of online and offline mixed English teaching model in the internet era
- Real-time semantic segmentation based on BiSeNetV2 for wild road
- Online English writing teaching method that enhances teacher–student interaction
- Construction of a painting image classification model based on AI stroke feature extraction
- Big data analysis technology in regional economic market planning and enterprise market value prediction
- Location strategy for logistics distribution centers utilizing improved whale optimization algorithm
- Research on agricultural environmental monitoring Internet of Things based on edge computing and deep learning
- The application of curriculum recommendation algorithm in the driving mechanism of industry–teaching integration in colleges and universities under the background of education reform
- Application of online teaching-based classroom behavior capture and analysis system in student management
- Evaluation of online teaching quality in colleges and universities based on digital monitoring technology
- Face detection method based on improved YOLO-v4 network and attention mechanism
- Study on the current situation and influencing factors of corn import trade in China – based on the trade gravity model
- Research on business English grammar detection system based on LSTM model
- Multi-source auxiliary information tourist attraction and route recommendation algorithm based on graph attention network
- Multi-attribute perceptual fuzzy information decision-making technology in investment risk assessment of green finance Projects
- Research on image compression technology based on improved SPIHT compression algorithm for power grid data
- Optimal design of linear and nonlinear PID controllers for speed control of an electric vehicle
- Traditional landscape painting and art image restoration methods based on structural information guidance
- Traceability and analysis method for measurement laboratory testing data based on intelligent Internet of Things and deep belief network
- A speech-based convolutional neural network for human body posture classification
- The role of the O2O blended teaching model in improving the teaching effectiveness of physical education classes
- Genetic algorithm-assisted fuzzy clustering framework to solve resource-constrained project problems
- Behavior recognition algorithm based on a dual-stream residual convolutional neural network
- Ensemble learning and deep learning-based defect detection in power generation plants
- Optimal design of neural network-based fuzzy predictive control model for recommending educational resources in the context of information technology
- An artificial intelligence-enabled consumables tracking system for medical laboratories
- Utilization of deep learning in ideological and political education
- Detection of abnormal tourist behavior in scenic spots based on optimized Gaussian model for background modeling
- RGB-to-hyperspectral conversion for accessible melanoma detection: A CNN-based approach
- Optimization of the road bump and pothole detection technology using convolutional neural network
- Comparative analysis of impact of classification algorithms on security and performance bug reports
- Cross-dataset micro-expression identification based on facial ROIs contribution quantification
- Demystifying multiple sclerosis diagnosis using interpretable and understandable artificial intelligence
- Unifying optimization forces: Harnessing the fine-structure constant in an electromagnetic-gravity optimization framework
- E-commerce big data processing based on an improved RBF model
- Analysis of youth sports physical health data based on cloud computing and gait awareness
- CCLCap-AE-AVSS: Cycle consistency loss based capsule autoencoders for audio–visual speech synthesis
- An efficient node selection algorithm in the context of IoT-based vehicular ad hoc network for emergency service
- Computer aided diagnoses for detecting the severity of Keratoconus
- Improved rapidly exploring random tree using salp swarm algorithm
- Network security framework for Internet of medical things applications: A survey
- Predicting DoS and DDoS attacks in network security scenarios using a hybrid deep learning model
- Enhancing 5G communication in business networks with an innovative secured narrowband IoT framework
- Quokka swarm optimization: A new nature-inspired metaheuristic optimization algorithm
- Digital forensics architecture for real-time automated evidence collection and centralization: Leveraging security lake and modern data architecture
- Image modeling algorithm for environment design based on augmented and virtual reality technologies
- Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks
- High-resolution image processing and entity recognition algorithm based on artificial intelligence
- Review Articles
- Transformative insights: Image-based breast cancer detection and severity assessment through advanced AI techniques
- Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
- Applications of integrating artificial intelligence and big data: A comprehensive analysis
- A systematic review of symbiotic organisms search algorithm for data clustering and predictive analysis
- Modelling Bitcoin networks in terms of anonymity and privacy in the metaverse application within Industry 5.0: Comprehensive taxonomy, unsolved issues and suggested solution
- Systematic literature review on intrusion detection systems: Research trends, algorithms, methods, datasets, and limitations