• Title/Summary/Keyword: TRANSFORM COEFFICIENTS

Search Result 765, Processing Time 0.025 seconds

Voice conversion using low dimensional vector mapping (낮은 차원의 벡터 변환을 통한 음성 변환)

  • Lee, Kee-Seung;Doh, Won;Youn, Dae-Hee
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.4
    • /
    • pp.118-127
    • /
    • 1998
  • In this paper, we propose a voice personality transformation method which makes one person's voice sound like another person's voice. In order to transform the voice personality, vocal tract transfer function is used as a transformation parameter. Comparing with previous methods, the proposed method can obtain high-quality transformed speech with low computational complexity. Conversion between the vocal tract transfer functions is implemented by a linear mapping based on soft clustering. In this process, mean LPC cepstrum coefficients and mean removed LPC cepstrum modeled by the low dimensional vector are used as transformation parameters. To evaluate the performance of the proposed method, mapping rules are generated from 61 Korean words uttered by two male and one female speakers. These rules are then applied to 9 sentences uttered by the same persons, and objective evaluation and subjective listening tests for the transformed speech are performed.

  • PDF

Fault Types-Classification and Section Discrimination Algorithm using Neuro-Fuzzy in Combined Transmission Lines (뉴로-퍼지를 이용한 혼합송전선로에서의 고장종류 및 고장구간 판별 알고리즘)

  • Kim, Kyoung-Ho;Lee, Jong-Beom
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.534-536
    • /
    • 2003
  • It is important to classily fault types and discriminate fault section by any detecting technique for combined transmission lines. This paper proposes the technique to classify the fault types and fault section using neuro-fuzzy systems. Neuro-fuzzy systems are composed of two parts to perform different works. First, neuro-fuzzy system for fault type classification is performed with approximation coefficient of currents obtained by wavelet transform. Another neuro-fuzzy system discriminates the fault section between overhead and underground with detail coefficients of voltage and current. In this paper, neuro-fuzzy system shows the excellent results for classification of fault types and discrimination of fault section.

  • PDF

Barcode Pattern Image Watermark Using Triplet (트리플릿을 이용한 바코드 패턴 이미지 워터마크)

  • Park, Byung-Su;Chu, Hyung-Suk;An, Chong-Koo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.12
    • /
    • pp.2330-2335
    • /
    • 2008
  • In this paper, we proposed a robust watermark scheme for image based on the discrete wavelet transform. In the first, we use the triplet method for embedding and extraction of watermark. Triplet method uses relationship among the discrete wavelet coefficients at the same position in the three detail subband of image. In the second, we use barcode Pattern Image for watermark scheme. By using barcode Pattern Images, a user is able to make many kinds of own watermark. In the third, the proposed method for image watermark provides the invisiblility which the other user can not discriminate watermark from watermarked image. The advantage of the proposed method is visibility when we extracted watermark from the image. The corresponding experimental results show that the proposed method has performance of a robustness from the noise attack.

Iris Pattern Recognition Using the Fourier Transform and Correlation Coefficients (푸리에 변환과 상관관계 계수 값을 이용한 홍채인식)

  • Go, Hyoun-Joo;Chun, Myung-Geun
    • Annual Conference of KIPS
    • /
    • 2002.11b
    • /
    • pp.969-972
    • /
    • 2002
  • 본 논문에서는 생체측정학(Biometrics)중 홍채 패턴을 이용하여 개인 인증과 확인을 할 수 있는 알고리듬을 개발하고 구현하였다. 사람의 홍채는 태어날 때 한번 정해지면 평생 변화하지 않으며, 개개인 별로 모양이 모두 다른 것으로 알려져 있다. 이런, 홍채 특징을 이용하여, 본 논문에서는 홍채영상 취득 시 조명에 의한 밝기 변화에 불변하고, 회전에 불변한 DFT 계수를 이용하였으며, correlation 계수를 이용하여 유사도를 측정하였다. 또한 개개인을 대표할 수 있는 기준데이터(code book)를 만들어 실험하였다.

  • PDF

Fast Codebook Search Algorithm for VQ of Subband Images (서브밴드 영상의 VQ를 위한 고속 코드북 탐색 알고리즘)

  • Hwang, Jae-Ho;Hong, Choong-Seon;Lee, Dae-Young
    • Annual Conference of KIPS
    • /
    • 2000.10b
    • /
    • pp.883-886
    • /
    • 2000
  • Two fast search algorithms are proposed for VQ encoding in subband/VQ coding schemes. These algorithms exploit the property of the transform domain that the large coefficients rarely exist in the decomposed subbands. And the exit condition of PDE algorithm can be satisfied by comparing the large values of the codeword with the corresponding ones of the input vector. The computational complexity can be reduced at the expense of memories without extra coding errors.

  • PDF

High Embedding Capacity and Robust Audio Watermarking for Secure Transmission Using Tamper Detection

  • Kaur, Arashdeep;Dutta, Malay Kishore
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.133-145
    • /
    • 2018
  • Robustness, payload, and imperceptibility of audio watermarking algorithms are contradictory design issues with high-level security of the watermark. In this study, the major issue in achieving high payload along with adequate robustness against challenging signal-processing attacks is addressed. Moreover, a security code has been strategically used for secure transmission of data, providing tamper detection at the receiver end. The high watermark payload in this work has been achieved by using the complementary features of third-level detailed coefficients of discrete wavelet transform where the human auditory system is not sensitive to alterations in the audio signal. To counter the watermark loss under challenging attacks at high payload, Daubechies wavelets that have an orthogonal property and provide smoother frequencies have been used, which can protect the data from loss under signal-processing attacks. Experimental results indicate that the proposed algorithm has demonstrated adequate robustness against signal processing attacks at 4,884.1 bps. Among the evaluators, 87% have rated the proposed algorithm to be remarkable in terms of transparency.

A new bridge-vehicle system part I: Formulation and validation

  • Chan, Tommy H.T.;Yu, Ling;Yung, T.H.;Chan, Jeffrey H.F.
    • Structural Engineering and Mechanics
    • /
    • v.15 no.1
    • /
    • pp.1-19
    • /
    • 2003
  • This paper presents the formulation of a new bridge-vehicle system with validation using the field data. Both pitching and twisting modes of the vehicle are considered in the contribution of the dynamic effects in the bridge responses. A heavy vehicle was hired as a control vehicle with known axle weight, axle spacing and spring coefficients. The measured responses were generated from the control vehicle running at a particular speed at a test span at Ma Tau Wai Flyover. The measured responses were acquired using strain gauges installed beneath the girder beams of the test bridge. The simulated responses were generated using BRVEAN that is a self-developed program based on the proposed bridge-vehicle system. The validation shows that the bridge model is valid for representing the test bridge and the governing equations are valid for representing the motion of moving vehicles.

High-Quality and Robust Reversible Data Hiding by Coefficient Shifting Algorithm

  • Yang, Ching-Yu;Lin, Chih-Hung
    • ETRI Journal
    • /
    • v.34 no.3
    • /
    • pp.429-438
    • /
    • 2012
  • This study presents two reversible data hiding schemes based on the coefficient shifting (CS) algorithm. The first scheme uses the CS algorithm with a mean predictor in the spatial domain to provide a large payload while minimizing distortion. To guard against manipulations, the second scheme uses a robust version of the CS algorithm with feature embedding implemented in the integer wavelet transform domain. Simulations demonstrate that both the payload and peak signal-to-noise ratio generated by the CS algorithm with a mean predictor are better than those generated by existing techniques. In addition, the marked images generated by the variant of the CS algorithm are robust to various manipulations created by JPEG2000 compression, JPEG compression, noise additions, (edge) sharpening, low-pass filtering, bit truncation, brightness, contrast, (color) quantization, winding, zigzag and poster edge distortion, and inversion.

Digital Watermarking by Rearranging and Modifying DCT Coefficients

  • Lee, Hee sup;Oh, Sang-Heun;Lee, Keun-Young
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.902-905
    • /
    • 2000
  • Because of the rapid growth of Internet and multimedia applications, how to protect IPR (intellectual property rights) has become a critical issue. Is one of the ways to overcome the problem of the protection of IPR. Digital watermarking call be applied to multimedia data, such as digital images, digital video, and digital audio. In this paper, we propose a digital watermarking technique for digital images to authenticate an owner or an image by embedding visually recognizable patterns, such as logos, signatures, or stamps into images In BDCT (block discrete cosine transform) frequency domain. The proposed method sorts the components of an original image twice. At the same time, the method, also, rearranges the components of a watermark twice in order to be more robust, and finally embeds the watermark into the image. From the experimental results, the conjunction of three similarity measurements shows that our proposed method is robust to image cropping, image filtering, and JPEG (the Joint Photographic Experts Group) both subjectively and objectively.

  • PDF

Path Planning for Manipulators Using Fourier Series (퓨리에 급수를 이용한 매니퓰레이터 경로 계획)

  • 원종화;최병욱;정명진
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.29B no.10
    • /
    • pp.27-36
    • /
    • 1992
  • This paper proposes a numerical method of motion planning for manipulators using Foruier series. For a redundant manipulator, we predetermine the trajectories of redundant joints in terms of the Nth partial sum of the fourier series. then the optimal coefficients of the fourier series are searched by the Powell's method. For a nonredundant or redundant manipulator, CS02T-continuous smooth joint trajectory for a point-to-point task can be obtained while considering the frequency response. We apply the proposed method to the 3-link planar manipulator and the PUMA 560 manipulator. To show the validity of the proposed method, we analyze solutions by the Fast Fourier Transform (FFT). Also, several features are discussed to obtain an optimal solution.

  • PDF