• Title/Summary/Keyword: DWT (Discrete Wavelet Transform)

Search Result 322, Processing Time 0.029 seconds

Digital Watermarking Scheme based on SVD and Triplet (SVD 및 트리플릿 기반의 디지털 워터마킹 기법)

  • Park, Byung-Su;Chu, Hyung-Suk;An, Chong-Koo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.5
    • /
    • pp.1041-1046
    • /
    • 2009
  • In this paper, we proposed a robust watermark scheme for image based on SVD(Singular Value Transform) and Triplet. First, the original image is decomposed by using 3-level DWT, and then used the singular values changed for embedding and extracting of the watermark sequence in LL3 band. Since the matrix of singular values is not easily altered with various signal processing noises, the embedded watermark sequence has the ability to withstand various signal processing noise attacks. Nevertheless, this method does not guarantee geometric transformation(such as rotation, cropping, etc.) because the geometric transformation changes the matrix size. In this case, the watermark sequence cannot be extracted. To compensate for the above weaknesses, a method which uses the triplet for embedding a barcode image watermark in the middle of frequency band is proposed. In order to generate the barcode image watermark, the pattern of the watermark sequence embedded in a LL3 band is used. According to this method, the watermark information can be extracted from attacked images.

Hardware Architecture of High Performance Cipher for Security of Digital Hologram (디지털 홀로그램의 보안을 위한 고성능 암호화기의 하드웨어 구조)

  • Seo, Young-Ho;Yoo, Ji-Sang;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.17 no.2
    • /
    • pp.374-387
    • /
    • 2012
  • In this paper, we implement a new hardware for finding the significant coefficients of a digital hologram and ciphering them using discrete wavelet packet transform (DWPT). Discrete wavelet transform (DWT) and packetization of subbands is used, and the adopted ciphering technique can encrypt the subbands with various robustness based on the level of the wavelet transform and the threshold of subband energy. The hologram encryption consists of two parts; the first is to process DWPT, and the second is to encrypt the coefficients. We propose a lifting based hardware architecture for fast DWPT and block ciphering system with multi-mode for the various types of encryption. The unit cell which calculates the repeated arithmetic with the same structure is proposed and then it is expanded to the lifting kernel hardware. The block ciphering system is configured with three block cipher, AES, SEED and 3DES and encrypt and decrypt data with minimal latency time(minimum 128 clocks, maximum 256 clock) in real time. The information of a digital hologram can be hided by encrypting 0.032% data of all. The implemented hardware used about 200K gates in $0.25{\mu}m$ CMOS library and was stably operated with 165MHz clock frequency in timing simulation.

Holographic Forensic Mark based on DWT-SVD for Tracing of the Multilevel Distribution (다단계 유통 추적을 위한 DWT-SVD 기반의 홀로그래피 포렌식마크)

  • Li, De;Kim, Jong-Weon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2C
    • /
    • pp.155-160
    • /
    • 2010
  • In this paper, we proposed a forensic mark algorithm which can embed the distributor's information at each distribution step to trace the illegal distribution path. For this purpose, the algorithm has to have the high capacity payload for embedding the copyright and user information at each step, and the embedded information at a step should not interfere with the information at other step. The proposed algorithm can trace the multilevel distribution because the forensic mark is generated by digital hologram and embedded in the DWT-SVD domain. For the high capacity embedding, the off-axis hologram is generated from the forensic mark and the hologram is embedded in the HL, LH, HH bands of the DWT to reduce the signal interference. The SVD which is applied the holographic signal enhanced the detection performance and the safety of the forensic mark algorithm. As the test results, this algorithm was able to embed 128bits information for the copyright and user information at each step. In this paper, we can embed total 384bits information for 3 steps and the algorithm is also robust to the JPEG compression.

Active damage localization technique based on energy propagation of Lamb waves

  • Wang, Lei;Yuan, F.G.
    • Smart Structures and Systems
    • /
    • v.3 no.2
    • /
    • pp.201-217
    • /
    • 2007
  • An active damage detection technique is introduced to locate damage in an isotropic plate using Lamb waves. This technique uses a time-domain energy model of Lamb waves in plates that the wave amplitude inversely decays with the propagation distance along a ray direction. Accordingly the damage localization is formulated as a least-squares problem to minimize an error function between the model and the measured data. An active sensing system with integrated actuators/sensors is controlled to excite/receive $A_0$ mode of Lamb waves in the plate. Scattered wave signals from the damage can be obtained by subtracting the baseline signal of the undamaged plate from the recorded signal of the damaged plate. In the experimental study, after collecting the scattered wave signals, a discrete wavelet transform (DWT) is employed to extract the first scattered wave pack from the damage, then an iterative method is derived to solve the least-squares problem for locating the damage. Since this method does not rely on time-of-flight but wave energy measurement, it is more robust, reliable, and noise-tolerant. Both numerical and experimental examples are performed to verify the efficiency and accuracy of the method, and the results demonstrate that the estimated damage position stably converges to the targeted damage.

A Feature Vector Extraction Method For the Automatic Classification of Power Quality Disturbances (전력 외란 자동 식별을 위한 특징 벡터 추출 기법)

  • Lee, Chul-Ho;Lee, Jae-Sang;Cho, Kwan-Young;Chung, Ji-Hyun;Nam, Sang-Won
    • Proceedings of the KIEE Conference
    • /
    • 1996.11a
    • /
    • pp.404-406
    • /
    • 1996
  • The objective of this paper is to present a new feature-vector extraction method for the automatic detection and classification of power quality(PQ) disturbances, where FFT, DWT(Discrete Wavelet Transform), and data compression are utilized to extract an appropriate feature vector. In particular, the proposed classifier consists of three parts: i.e., (i) automatic detection of PQ disturbances, where the wavelet transform and signal power estimation method are utilized to detect each disturbance, (ii) feature vector extraction from the detected disturbance, and (iii) automatic classification, where Multi-Layer Perceptron(MLP) is used to classify each disturbance from the corresponding extracted feature vector. To demonstrate the performance and applicability of the proposed classification algorithm, some test results obtained by analyzing 7-class power quality disturbances generated by the EMTP are also provided.

  • PDF

Electrocardiographic characteristics of significant factors of detected atrial fibrillation using WEMS

  • Kim, Min Soo;Kim, Yoon Nyun;Cho, Young Chang
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.6
    • /
    • pp.37-46
    • /
    • 2015
  • The wireless electrocardiographic monitoring system(WDMS) is designed to be long term monitoring for the early detection of cardiac disorders. The current version of the WDMS can identify two types of cardiac rhythms in real-time, such as atrial fibrillation(AF) and normal sinus rhythm(NSR), which are very important to track cardiac-rhythm disorders. In this study, we proposed the analysis method to discriminate the characteristics statistically evaluated in both time and frequency domains between AF and NSR using various parameters in the heart rate variability(HRV). And we applied various ECG detection methods (e.g., difference operation method) and compared the results with those of the discrete wavelet transform(DWT) method. From the statistically results, we found that the parameters such as STD RR, STD HR, RMSSD, NN50, pNN50, RR Trian, and TNN(p<0.05) are significantly different between the AF and NSR patients in time domain. On the other hand, the frequency domain analysis results showed a significant difference in VLF power($ms^2$), LF power($ms^2$), HF power($ms^2$), VLF(%), LF(%), and HF(%). In particular, the parameters such as STD RR, RMSSD, NN50, pNN50, VLF power, LF power and HF power were considered as the most useful parameters in both AF and NSR patient groups. Our proposed method can be efficiently applied to early detection of abnormal conditions and prevent the such abnormals from becoming serious.

A Robust Blind Watermarking for Digital Image Using DWT According to its Resolution (해상도에 따른 DWT 기반 디지털 영상의 강인성 블라인드 워터마킹)

  • Lee, Yongseok;Seo, Youngho;Kim, Dongwook
    • Journal of Broadcast Engineering
    • /
    • v.20 no.6
    • /
    • pp.888-900
    • /
    • 2015
  • This paper proposes a blind watermarking scheme using DWT satisfying robustness, invisibility, and security to protect the ownership of digital image contents. This scheme does not determine any watermarking position by local image information. It rather inserts the watermark information into all the four lowest frequency subbands after transforming the host image by n-level 2-dimensional DWT, depending on, the sizes of the host image and the watermark data. Its watermark insertion methodology uses some weighting factors according to the kind of the subband and its energy level to adjust the invisibility and the robustness of the watermark. This method is experimented for various pixel-value change attacks and geometric attacks with various images having different resolutions and aspect ratios. With the experimental results and by comparing with existing methods, we show that the proposed method has a great deal of general usage with good watermark invisibility and good robustness against attacks.

Facial Image Recognition Based on Wavelet Transform and Neural Networks (웨이브렛 변환과 신경망 기반 얼굴 인식)

  • 임춘환;이상훈;편석범
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.3
    • /
    • pp.104-113
    • /
    • 2000
  • In this study, we propose facial image recognition based on wavelet transform and neural network. This algorithm is proposed by following processes. First, two gray level images is captured in constant illumination and, after removing input image noise using a gaussian filter, differential image is obtained between background and face input image, and this image has a process of erosion and dilation. Second, a mask is made from dilation image and background and facial image is divided by projecting the mask into face input image Then, characteristic area of square shape that consists of eyes, a nose, a mouth, eyebrows and cheeks is detected by searching the edge of divided face image. Finally, after characteristic vectors are extracted from performing discrete wavelet transform(DWT) of this characteristic area and is normalized, normalized vectors become neural network input vectors. And recognition processing is performed based on neural network learning. Simulation results show recognition rate of 100 % about learned image and 92% about unlearned image.

  • PDF

A Overdrive Technique Architecture for the Frame Memory Reduction based on DWT and Color Conversion (Frame Memory 축소를 위한 DWT와 Color Conversion 기반의 Overdrive 구조)

  • Byeon, Jin-Su;Kim, Hyeon-Seop;Kim, Do-Seok;Jeon, Eun-Seon;Hong, In-Seong;Kim, Bo-Gwan
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.1
    • /
    • pp.85-91
    • /
    • 2009
  • Recently, the LCD has high market share in TV market. The use of motion images in portable devices like DMB, PMP and Cell Phone is growing rapidly. One of the technique of enhancing the LCD's characteristic which is the slow response time. But, the technique requires a lot of memory usage, because of the requirement of frame memory. In this paper, we propose a reduction method for the frame memory that is required for LCD overdrive. Proposed overdrive architecture based on modified DWT-Inverse DWT and Color Conversion. The proposed architecture has a considerable PSNR. At once, it uses 50% of frame memory size and reduces 15% of frame memory size compare with previous architecture. The design was implemented using Xilinx Vertex4 and had 2172 Slice except Memory.

A Video Watermarking Using 3D DWT and Binary Image Watermark (3차원 웨이블릿 변환과 이진 영상 워터마크를 이용한 비디오 워터마킹)

  • Kim Seung-Jin;Kim Tae-Su;Kwon Ki-Ryong;Lee Kuhn-Il
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.27-32
    • /
    • 2005
  • An effective video watermarking algorithm is proposed to protect the copyright. The watermarking procedure is based on a three-dimensional discrete wavelet transform (3D DWT) and spread spectrum sequences. Two perceptual binary watermarks are preprocessed using mixing and pseudorandom permutation. After dividing the video sequence into video shots, the 3D DWT is performed, then the preprocessed watermarks are embedded into the 3D DWT coefficients, while considering robustness and invisibility, using two spread spectrum sequences defined as the user key. Experimental results show that the watermarked frames are subjectively indistinguishable from the original frames, plus the proposed video watermarking algorithm is sufficiently robust against such attacks as low pass filtering, frame dropping, frame average, and MPEG coding.