• Title/Summary/Keyword: 적응적 양자화

Search Result 150, Processing Time 0.021 seconds

Adaptive Image Watermark Embedding Using JND Characteristic within Multiwavelet Transform (멀티웨이브릿 변환 영역에서 JND 특성을 이용한 적응 워터마크 은닉 기술)

  • 강균호;장봉주;조영웅;권성근;문광석;권기룡
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.855-860
    • /
    • 2002
  • 본 논문에서는 화질의 열화를 최소화함과 동시에 강인한 워터마크의 은닉을 위하여 멀티 웨이브릿 변환영역에서 인간 시각 특성(human visual system: HVS)을 고려한 적응 워터마크 은닉 기술을 제안한다. 멀티웨이브릿은 영상을 완전 복원시키는데 탁월한 효과가 있으며 경계영역에서 우수한 성능을 갖는다. 본 논문에서 사용한 멀티웨이브릿 함수는 근사화 차수가 2인 DHGM 멀티웨이브릿을 사용한다. 워터마크는 멀티웨이브릿 분해된 부대역들 중 저주파 영역을 제외한 중간 및 고주파 영역의 웨이브릿 계수 중에 HVS를 이용하여 얻은 문턱값에 의해 선택된 웨이브릿 계수들에만 은닉한다. 워터마크를 은닉하기 위한 지각모델은 영상 압축시 지각적 양자화기에 사용되는 정적 JND(just noticeable difference) 모델을 이용한다. 제안한 은닉모델은 영상의 특성에 따라 은닉하는 워터마크의 수가 각각 달라졌다. 또한, 여러 실험결과 우수한 비가시성과 강인성을 확인하였다.

  • PDF

Performance Comparison of SE-MMA and QE-MMA for Adaptive Equalization in Nonconstant modulus signal (Nonconstant modulus 신호의 적응 등화를 위한 SE-MMA와 QE-MMA 알고리즘 성능 비교)

  • Lim, Seung Gag
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.105-111
    • /
    • 2017
  • This paper compares the SE-MMA (Signed Error-MMA) and QE-MMA (Quantized Error-MMA) adaptive equalization algorithm in order to compensates the intersymbol interference due to channel in the transmission of spectral efficient nonconstant modulus signal such as 16-QAM. In the currently MMA adaptive equalizer, the error signal is needed for the updating the tap coefficient. The SE-MMA uses the polarity of error signal for reduce the computational operation in that process, the QE-MMA consider the this polarity and finite bit power-of-2 quantized component in that process, so they has different equalization performance. In order to comparing these performance, the computer simulation was performed in the same channel and environment, the output signal constellation of equalizer, residual isi and maximum distortion, MSE, SER were applied. As a result of computer simulation, the QE-MMA have more superior performance than the SE-MMA in every performance index.

DC Offset Adjusted Inter Prediction Algorithm for Improving H.264/AVC Video Coding Efficiency (H.264/AVC 동영상 압축율 향상을 위한 DC 오프셋 보정에 기반한 인터 예측 알고리즘)

  • Yoon, Dae-Il;Kim, Hae-Kwang
    • Journal of Broadcast Engineering
    • /
    • v.16 no.5
    • /
    • pp.793-796
    • /
    • 2011
  • H.264/AVC compresses video data by applying DCT transform, quantization and entropy coding processes to the residual signal obtained by inter/intra prediction. This paper proposes a method enhancing an existing DC offset adjustment technology which uses information of neighboring blocks to reduce residual information for improving coding efficiency. DC offset information is not sent over bitstreams, but calculated in the same way both in the decoder and in the encoder. Experimental results show that the proposed method enhances coding efficiency by 0.25% in average BD-Rate compared to H.264/AVC and gives better or worse coding efficiency compared to the existing DC offset method depending on video sequences with coding efficiency degradation by 0.09% in average BD-Rate. This experimental results also show that further coding efficiency improvement is possible by applying the proposed method adaptively to slice or macroblock coding units.

Semi-Fragile Image Watermarking for Authentication Using Wavelet Packet Transform Based on The Subband Energy (부대역 에너지 기반 웨이블릿 패킷 변환을 이용한 인증을 위한 세미 프레자일 영상 워터마킹)

  • Park, Sang-Ju;Kwon, Tae-Hyeon
    • The KIPS Transactions:PartB
    • /
    • v.12B no.4 s.100
    • /
    • pp.421-428
    • /
    • 2005
  • A new method of Semi-fragile image watermarking which ensures the integrity of the contents of digital image is presented. Proposed watermarking scheme embeds watermark in the form of quantization noise on the wavelet transform coefficients in a specific mid frequency subbands selected from a wavelet packet decomposition based on energy distribution of wavelet transform coefficients. By controlling the strength of embedded watermark using HVS (Human Visual System) characteristic, it is imperceptible by a human viewer while robust against non-malicious attack such as compression for storage and/or transmission. When an attack is applied on the original image, it is highly probable that wavelet transform coefficients not only at the exact attack positions but also the neighboring ones are modified. Therefore, proposed authentication method utilizes whether both current coefficient and its neighbors are damaged. together. So it can efficiently detect and accurately localize attacks inflicted on the content of original image. Decision threshold for authentication can be user controlled for different application areas as needed.

A Study on the DCT Image Coding Considering Weber's law (웨버의 법칙을 고려한 DCT 영상 부호화에 관한 연구)

  • 이은국;김장복
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.5
    • /
    • pp.663-674
    • /
    • 1993
  • In this paper, a DCT image coding algorithm using the human visual property is proposed. Human visual is relatively sensitive to noise in the darker region, insensitive to noise in the brighter region. This property was proved by Weber's law through psycovisual experiment. Weber's law states that the just noticeable difference (j.n.d.) is proportional to intensity. Therefore, the implication of this observation for image processing is that reducing noise in the darker region is more important than reducing noise in the brighter region. In this proposed coding scheme AC coefficients in the darker region are more finely quantized than those in the brighter region. Results showed that, at low bit rate, the subjective quality of reconstructed images by proposed coding scheme is improved than that of coding scheme without considering human visual property.

  • PDF

MU-MIMO Scheduling using DNN-based Precoder with Limited Feedback (심층신경망 기반의 프리코딩 시스템을 활용한 다중사용자 스케줄링 기법에 관한 연구)

  • Kyeongbo Kong;Moonsik Min
    • Journal of Broadcast Engineering
    • /
    • v.28 no.1
    • /
    • pp.141-144
    • /
    • 2023
  • Recently, a joint channel estimation, channel quantization, feedback, and precoding system based on deep-neural network (DNN) was proposed. The corresponding system achieved a joint optimization based on deep learning such that it achieved a higher sum rate than the existing codebook-based precoding systems. However, this DNN-based procoding system is not directly applicable for the environments with many users such that a specific user selection can potentially increase the sum rate of the system. Thus, in this letter, we study an appropriate user selection method suitable for DNN-based precoding.

Fast Mode Decision Method for HEVC in Depth Video (HEVC를 위한 깊이 영상 고속 모드 결정 방법)

  • Yoon, Da-Hyun;Ho, Yo-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1A
    • /
    • pp.51-56
    • /
    • 2012
  • In order to reduce the complexity of HEVC, we propose a fast mode decision algorithm in depth videos. Since almost CU mode is decided as SKIP mode in depth-continuity regions, we design the algorithm using the property of depth videos. If cost of SKIP is smaller than the multiplication between the threshold for EarlySKIP and average cost of SKIP, EarlySKIP is performed. Otherwise, we calculate Inter $2N{\times}2N$. Then, if motion vector of Inter $2N{\times}2N$ is 0 and variance of CU is smaller than threshold for inter, we skip Inter $2N{\times}N$, Inter $N{\times}2N$. Experimental results show that our proposed algorithm reduces the encoding time from 39% to 82% with negligible PSNR loss and bitrate increase.

Digital Cage Watermarking using Human Visual System and Discrete Cosine Transform (인지 시각시스템 및 이산코사인변환을 이용한 디지털 이미지 워터마킹)

  • 변성철;김종남;안병하
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.17-23
    • /
    • 2003
  • In this Paper. we Propose a digital watermarking scheme for digital images based on a perceptual model, the frequency masking, texture making, and luminance masking Properties of the human visual system(HVS), which have been developed in the context of image compression. We embed two types of watermark, one is pseudo random(PN) sequences, the other is a logo image. To embed the watermarks, original images are decomposed into $8\times8$ blocks, and the discrete cosine transform(DCT) is carried out for each block. Watermarks are casted in the low frequency components of DCT coefficients. The perceptual model adjusts adaptively scaling factors embedding watermarks according to the local image properties. Experimental results show that the proposed scheme presents better results than that of non-perceptual watermarking methods for image qualify without loss of robustness.

Blocking artifacts reduction for improving visual quality of highly compressed images (압축영상의 화질향상을 위한 블록킹 현상 제거에 관한 연구)

  • 이주홍;김민구;정제창;최병욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.8
    • /
    • pp.1677-1690
    • /
    • 1997
  • Block-transform coding is one of the most popular approaches for image compression. For example, DCT is widely used in the internaltional standards standards such as MPEG-1, MPEG-2, JPEG, and H.261. In the block-based transform coding, blocking artifacts may appear along block boundaries, and they can cause severe image degradation eqpecially when the transform coefficients are coarsely quantized. In this paper, we propose a new method for blocking artifacts reduction in transform-coded images. For blocking artifacts reduction, we add a correction term, on a block basis, composed of a linear combination of 28 basis images that are orthonormal on block boundaries. We select 28 DCT kernel functions of which boundary values are linearly independent, and Gram-Schmidt process is applied to the boundary values in order to obtain 28 boundary-orthonormal basis images. A threshold of bolock discontinuity is introduced for improvement of visual quality by reducing image blurring. We also investigate the number of basis images needed for efficient blocking artifacts reduction when the compression ratio changes.

  • PDF

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.