Image compression techniques in the field of security technology: examples and discussion | IEEE Conference Publication | IEEE Xplore