• Title/Summary/Keyword: 푸리에 연산

Search Result 37, Processing Time 0.023 seconds

Time- and Frequency-Domain Block LMS Adaptive Digital Filters: Part Ⅰ- Realization Structures (시간영역 및 주파수영역 블럭적응 여파기에 관한 연구 : 제1부- 구현방법)

  • Lee, Jae-Chon;Un, Chong-Kwan
    • The Journal of the Acoustical Society of Korea
    • /
    • v.7 no.4
    • /
    • pp.31-53
    • /
    • 1988
  • In this work we study extensively the structures and performance characteristics of the block least mean-square (BLMS) adaptive digital filters (ADF's) that can be realized efficiently using the fast Fourier transform (FFT). The weights of a BLMS ADF realized using the FFT can be adjusted either in the time domain or in the frequency domain, leading to the time-domain BLMS(TBLMS) algorithm or the frequency-domain BLMS (FBLMS) algorithm, respectively. In Part Ⅰof the paper, we first present new results on the overlap-add realization and the number-theoretic transform realization of the FBLMS ADF's. Then, we study how we can incorporate the concept of different frequency-weighting on the error signals and the self-orthogonalization of weight adjustment in the FBLMS ADF's , and also in the TBLMS ADF's. As a result, we show that the TBLMS ADF can also be made to have the same fast convergence speed as that of the self-orthogonalizing FBLMS ADF. Next, based on the properties of the sectioning operations in weight adjustment, we discuss unconstrained FBLMS algorithms that can reduce two FFT operations both for the overlap-save and overlap-add realizations. Finally, we investigate by computer simulation the effects of different parameter values and different algorithms on the convergence behaviors of the FBLMS and TBLMS ADF's. In Part Ⅱ of the paper, we will analyze the convergence characteristics of the TBLMS and FBLMS ADF's.

  • PDF

An Implementation of Stable Optical Security System using Interferometer and Cascaded Phase Keys (간섭계와 직렬 위상 키를 이용한 안정한 광 보안 시스템의 구현)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.1
    • /
    • pp.101-107
    • /
    • 2007
  • In this paper, we proposed an stable optical security system using interferometer and cascaded phase keys. For the encryption process, a BPCGH(binary phase computer generated hologram) that reconstructs the origial image is designed, using an iterative algorithm and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. For the decryption process, we cascade the encrypted image and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the origianl image is recovered by an inverse Fourier transformation of the phase information. During this process, interference intensity is very sensitive to external vibrations. a stable interference pattern is obtained using self-pumped phase-conjugate minor made of the photorefractive material. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the key images, so can be used an authorized system.

  • PDF

Physical Database Design for DFT-Based Multidimensional Indexes in Time-Series Databases (시계열 데이터베이스에서 DFT-기반 다차원 인덱스를 위한 물리적 데이터베이스 설계)

  • Kim, Sang-Wook;Kim, Jin-Ho;Han, Byung-ll
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1505-1514
    • /
    • 2004
  • Sequence matching in time-series databases is an operation that finds the data sequences whose changing patterns are similar to that of a query sequence. Typically, sequence matching hires a multi-dimensional index for its efficient processing. In order to alleviate the dimensionality curse problem of the multi-dimensional index in high-dimensional cases, the previous methods for sequence matching apply the Discrete Fourier Transform(DFT) to data sequences, and take only the first two or three DFT coefficients as organizing attributes of the multi-dimensional index. This paper first points out the problems in such simple methods taking the firs two or three coefficients, and proposes a novel solution to construct the optimal multi -dimensional index. The proposed method analyzes the characteristics of a target database, and identifies the organizing attributes having the best discrimination power based on the analysis. It also determines the optimal number of organizing attributes for efficient sequence matching by using a cost model. To show the effectiveness of the proposed method, we perform a series of experiments. The results show that the Proposed method outperforms the previous ones significantly.

  • PDF

Analysis on Digital Image Composite Using Interpolation (보간을 이용한 디지털 이미지 합성 분석)

  • Song, Geun-Sil;Yun, Yong-In;Lee, Won-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.3
    • /
    • pp.457-466
    • /
    • 2010
  • In this paper, we propose a new method for detecting digital forgery that identify interpolated region between digital composited images. For detecting the interpolation factor and the tampered regions, we perform two algorithms: The first algorithm is to estimate the interpolation factors using the differential equation for forgery image along the horizontal, vertical, and diagonal directions, respectively; The second algorithm is to scan the interpolation factors along each direction for detection areas as the mask of the optical window size($64{\times}64$) in order to find out the forgery region. A detection map of the forgery is classified with the magnitude of estimated interpolation factors into colors. This detection map can be used to find out interpolated regions from the tampered image. Experimental results demonstrate the proposed algorithms are proven on several examples. We also show the proposed approach is to accurately detect interpolated regions from digital composite images.

Iterative Bispectrum Estimation and Signal Recovery Based On Weighted Regularization (가중 정규화에 기반한 반복적 바이스펙트럼 추정과 신호복원)

  • Lim, Won-Bae;Hur, Bong-Soo;Lee, Hak-Moo;Kang, Moon-Gi
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.37 no.3
    • /
    • pp.98-109
    • /
    • 2000
  • While the bispectrum has desirable properties in itself and therefore has a lot of potential to be applied to signal and Image restoration. few real-world application results have appeared in literature The major problem with this IS the difficulty In realizing the expectation operator of the true bispectrum, due to the lack of realizations. In this paper, the true bispectrum is defined as the expectation of the sample bispectrum, which IS the Fourier representation of the triple correlation given one realization The characteristics of the sample bispectrum are analyzed and a way to obtain an estimate of the true bispectrum without stochastic expectation, using the generalized theory of weighted regularization is shown. The bispectrum estimated by the proposed algorithm is experimentally demonstrated to be useful for signal recovery under blurred noisy condition.

  • PDF

An Iterative Digital Image Watermarking Technique using Encrypted Binary Phase Computer Generated Hologram in the DCT Domain (DCT 영역에서 암호화된 이진 위상 컴퓨터형성 홀로그램을 이용한 반복적 디지털 영상 워터마킹 기술)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.3
    • /
    • pp.15-21
    • /
    • 2009
  • In this paper, we proposed an iterative digital image watermarking technique using encrypted binary phase computer generated hologram in the discrete cosine transform(OCT) domain. For the embedding process of watermark, using simulated annealing algorithm, we would generate a binary phase computer generated hologram(BPCGH) which can reconstruct hidden image perfectly instead of hidden image and repeat the hologram and encrypt it through the XOR operation with key image that is ramdomly generated binary phase components. We multiply the encrypted watermark by the weight function and embed it into the DC coefficients in the DCT domain of host image and an inverse DCT is performed. For the extracting process of watermark, we compare the DC coefficients of watermarked image and original host image in the DCT domain and dividing it by the weight function and decrypt it using XOR operation with key image. And we recover the hidden image by inverse Fourier transforming the decrypted watermark. Finally, we compute the correlation between the original hidden image and recovered hidden image to determine if a watermark exits in the host image. The proposed watermarking technique use the hologram information of hidden image which consist of binary values and encryption technique so it is very secure and robust to the external attacks such as compression, noises and cropping. We confirmed the advantages of the proposed watermarking technique through the computer simulations.

Cancellation of Motion Artifact in MRI (MRI에 있어서 체동 아티팩트의 제거)

  • Kim, Eung-Kyeu
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.37 no.3
    • /
    • pp.70-78
    • /
    • 2000
  • In this study, a new method for canceling MRI artifacts through the motion translation of image plane is presented Breathing often makes problems in a clinical diagnosis. Assuming that the head moves up and down due to breathing, rigid translational motions in only y(phase encoding axis) direction are treated Unlike the conventional Iterative phase retrieval algorithm, this method is based on the MRI imaging process and analyzing of Image property A new constraint condition with which the motion component and the true image component in the MRI signal can be separated by a simple algebraic operation is extracted After the x(read out) directional Fourier transformation of MRI signal is done, the y(phase encoding) directional spectrum phasing value is Just an algebraic sum of the Image component and the motion component Meanwhile, as It is known that the density of subcutaneous fat area is almost uniform in the head tomographs, the density distribution along a y directional line on this fat area is regarded as symmetric shape If the density function is symmetric, then the phase of spectrum changes linearly with the position Hence, the departure component from the linear function can be separated as the motion component Based on this constrant condition, the new method of artifact cancellation is presented Finally, the effectiveness of this algorithm IS shown by using a phantom with simulated motions.

  • PDF