• Title/Summary/Keyword: jpeg

Search Result 862, Processing Time 0.025 seconds

A Design of Two-Dimensional Wavelet Transformer Using SDRAM (SDRAM을 이용한 이차원 웨이블렛 변환기의 설계)

  • 이선영;홍석일;조경순
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.351-355
    • /
    • 1999
  • The amount of data stored, processed and transmitted in the multi-media systems has been growing very fast, especially for the image data. For example, it takes 0.75Mbytes to store 512 12 pixels of 24-bit color image. A video signal with 30 frames per second will require 22.5Mbytes of storage space. To solve this problem, we need a good image compression technique. Recently, many researches on the image compression technique based on the wavelet transform are being pursued to overcome the problems of traditional JPEG. This paper describes the architecture and design of two-dimensional wavelet transform circuit. To keep the sire of the circuit small, we tried to minimize the internal storage space by using external SDRAM. This circuit was designed in Verilog-HDL, synthesized using Design Compiler and verified using Verilog-XL.

  • PDF

A Memory-Efficient VLC Decoder Architecture for MPEG-2 Application

  • Lee, Seung-Joon;Suh, Ki-bum;Chong, Jong-wha
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.360-363
    • /
    • 1999
  • Video data compression is a major key technology in the field of multimedia applications. Variable-length coding is the most popular data compression technique which has been used in many data compression standards, such as JPEG, MPEG and image data compression standards, etc. In this paper, we present memory efficient VLC decoder architecture for MPEG-2 application which can achieve small memory space and higher throughput. To reduce the memory size, we propose a new grouping, remainder generation method and merged lookup table (LUT) for variable length decoders (VLD's). In the MPEG-2, the discrete cosine transform (DCT) coefficient table zero and one are mapped onto one memory whose space requirement has been minimized by using efficient memory mapping strategy The proposed memory size is only 256 words in spite of mapping two DCT coefficient tables.

  • PDF

The Error Concealment Scheme Using DCT Based Image Coding for Mobile Network (무선 네트워크를 위한 DCT 기반의 오류 은닉 기법)

  • 양승준;박성찬;이귀상
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.89-92
    • /
    • 2000
  • The wireless network has bursty and high error rates. Due to the quite limited bandwidth in wireless networks, images are usually transmitted as a compressed version with VLC(variable length coding). Loss of coded data can affect a decoded image to a large extent, making concealment of errors caused by data loss an important issue. This paper presents a error concealment technique for DCT(Discrete Cosine Transform) based image coding. First, a method to estimate the missing DC coefficients of a JPEG coded image which is required for decoding the compressed image, is suggested and evaluated. Second, the missing data is interpolated by exploiting the probability of being nonzero and the correlation between adjacent blocks. In addition, since the these technique is computational efficient, it conserves system resources and power consumption, which are restrictive in mobile computers.

  • PDF

Image VQ Using Two-Stage Self-Organizing Feature Map in the Transform Domain (2 단 Self-Organizing Feature Map 을 사용한 변환 영역 영상의 벡터 양자화)

  • 이동학;김영환
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.32B no.3
    • /
    • pp.57-65
    • /
    • 1995
  • This paper presents a new classified vector quantization (VQ) technique using a neural network model in the transform domain. Prior to designing a codebook, the proposed approach extracts class features from a set of images using self-organizing feature map (SOFM) that has the pattern recognition characteristics and the same as VQ objective. Since we extract the class features from the training images unlike previous approaches, the reconstructed image quality is improved. Moreover, exploiting the adaptivity of the neural network model makes our approach be easily applied to designing a new vector quantizer when the processed image characteristics are changed. After the generalized BFOS algorithm allocates the given bits to each class, codebooks of each class are also generated using SOFM for the maximal reconstructed image quality. In experimental results using monochromatic images, we obtained a good visual quality in the reconstructed image. Also, PSNR is comparable to that of other classified VQ technique and is higher than that of JPEG baseline system.

  • PDF

Image Be-noising Using Lifting Scheme (Lifting Scheme을 이용한 이미지 잡음 제거)

  • Park, Young-Seok;Kwak, Hoon-Sung
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1731-1734
    • /
    • 2003
  • In this paper, we describe an approach for image denoising using the lifting construction, with the spatial adaptive wavelet transform. The adaptive lifting scheme is implemented in spatial domain to be adjusted thresholds to reduce noise. In this approach we represent adaptive characteristics of biorthogonal wavelets for choosing predictors effectively. Predict filter is changed from sample to sample according to local signal features with their vanishing moments. We in this approach have implemented and applied to image denoising by finding a relevant minimax threshold. Experimental results show that the adaptive method of denoising process is compared with existing ones, such as non-adaptive wavelet, CRF(13, 7) and SWE(13, 7) wavelets used by JPEG2000.

  • PDF

Wavelet Based Watermarking Technique Using PIM(Picture information measure) (PIM(Picture information measure)을 이용한 Wavelet기반 워터마킹 기법)

  • 김윤평;김영준;이동규;한수영;이두수
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1811-1814
    • /
    • 2003
  • In this paper, a novel watermarking technique is proposed to authenticate the owner-ship of copyright for the digital contents. Using the 2-level DWT(Discrete Wavelet Transform) we divide a specific frequency band into detailed blocks and apply PIM(picture information measure). After the complexity is calculated, the watermark is embedded in only on high complexity areas. Conventional watermarking technique damages to the original image, because it does not consider the feature of the whole area or a specific frequency band. Easily affected by noise and compression, it is difficult to extract the watermark. However, the proposed watermarking technique, considering the complexity of input image, does not damage to the original image Simulation result show that the proposed technique has the robustness of JPEG compression, noise and filtering such as a general signal processing

  • PDF

A Study on SVD & DWT -based watermarking for protecting rightful ownership (정당한 소유권 보호를 위한 DWT와 SVD기반의 디지털 워터마킹에 대한 연구)

  • 구대욱;한수영;이동규;이두수
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1815-1818
    • /
    • 2003
  • Digital watermarking is technique, which owner's information is inserted in digital image, with intention to protecting a copyright of digital image. In watermarking for copyright and authentication, watermark shouldn't be distorted or disappeared after general image processes like a compression and filtering. In this paper, we present a new digital image watermarking algorithm which combines the discrete wavelet transform (DWT) and the singular value decomposition (SVD). Simulation results show that the newly proposed algorithm is not only robust nevertheless variable attacks like noise, filtering and JPEG compression but also secure in application.

  • PDF

A Study for Multiple ROI Coding of Enhanced MAXSHIFT Method (Multiple ROI 코딩을 위한 개선된 Maxshift 기법에 관한 연구)

  • 이한정;이경민;김미화;황도연;박영석;유강수;곽훈성
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1847-1850
    • /
    • 2003
  • In many image-coding applications such as web browsing, image databases, and telemedicine, it is needed that only a region of interest(ROI) is transmitted and then reconstructed first before the whole image is transmitted and reconstructed. The Maxshift method has been used as a standard one in this research about ROI coding in JPEG2000. However Maxshift method can process only one ROI, this paper suggests an improved Maxshift method which can process Multiple ROI haying the priority order. In this method, the ROI coefficient which has the high priority order can be moved to upward two bit plane in order to process multiple ROI.

  • PDF

The implementation of an 8*8 2-D DCT using ROM-based multipliers (ROM 방식의 곱셈기를 이용한 8*8 2차원 DCT의 구현)

  • 이철동;정순기
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.11
    • /
    • pp.152-161
    • /
    • 1996
  • This paper descrisbes the implementation of a 20D DCT that can be used for video conference, JPEG, and MPEG-related applications. The implemented DCT consists of two 1-D DCTs and a transposed memory between them, and uses ROM-based multipliers instead of conventional ones. As the system bit length, the minimum bit length that satisfies the accuracy specified by the ITU standard H.261 was chosen through the simulations using the C language. The proposed design uses a dual port RAM for the transposed memory, and processes two bits of input-pixel data simultaneously t ospeed up addition process using two sets of ROMs. The basic system architecture was designed using th Synopsys schematic editor, and internal modules were described in VHDL and synthesized to logic level after simulation. Then, the compass silicon compiler was used to create the final lyout with 0.8um CMOS libraries, using the standard cell approach. The final layout contains about 110, 000 transistors and has a die area of 4.68mm * 4.96mm, and the system has the processing speed of about 50M pixels/sec.

  • PDF

Hybrid Watermarking Scheme using a Data Matrix and Secret Key (데이터 매트릭스와 비밀 키를 이용한 하이브리드 워터마킹 방법)

  • Jeon, Seong-Goo;Kim, Il-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.144-146
    • /
    • 2006
  • The Data Matrix of two-dimensional bar codes is a new technology capable of holding relatively large amounts of data compared to the conventional one-dimensional bar code which is just a key that can access detailed information to the host computer database. A secret key is used to prevent a watermark from malicious attacks. We encoded copyright information into a Data Matrix bar code for encoding process and it was spread a pseudo random pattern using owner key. We embedded a randomized watermark into the image using watermark's embedding position, pattern generated with a secret key. The experimental results have shown that the proposed scheme has good quality and is very robust to various attacks, such as JPEG compression and noise. Also the performance of the proposed scheme is verified by comparing the copyright information with the information which is extracted from a bar code scantier.

  • PDF