Browse > Article
http://dx.doi.org/10.13067/JKIECS.2012.7.5.1017

Design of the Entropy Processor using the Memory Stream Allocation for the Image Processing  

Lee, Seon-Keun (원광대학교 전기전자 및 정보공학부)
Jeong, Woo-Yeol (한려대학교 멀티미디어정보통신공학과)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.7, no.5, 2012 , pp. 1017-1026 More about this Journal
Abstract
Due to acceleration of the IT industry and the environment for a variety of media in modern society, such as real-time video images 3D-TV is a very important issue. These high-quality live video is being applied to various fields such as CCTV footage has become an important performance parameters. However, these high quality images, even vulnerable because of shortcomings secure channel or by using various security algorithms attempt to get rid of these disadvantages are underway very active. These shortcomings, this study added extra security technologies to reduce the processing speed image processing itself, but by adding security features to transmit real-time processing and security measures for improving the present.
Keywords
image processing; memory management; stream cryptographic; huffman code; compression;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 A. F. Inglis, "Video Engineering", Mc- Graw-Hill, New York, 1993.
2 D. J. Legall, "MPEG : A Video Compression Standard for Multimedia Applications", Commun. of the ACM", Vol. 34, No. 4, pp. 47-58, April 1991.
3 A. Puri, R. Aravind, and B. G. Haskell, "Adaptive Frame/Field Motion Compensated Video Coding", Signal Processing : Image commun., Vol. 5, pp. 39-58, February 1993.   DOI   ScienceOn
4 D. Anastassiou, "Scalability for HDTV", International Workshop on HDTV'92, Signal Processing of HDTV, IV, pp. 9-15, 1993.
5 E. Petajan, "The HDTV Grand Alliance System", Proceedings of the IEEE, Vol. 83, No. 7, pp. 1094-1105, July 1995.   DOI   ScienceOn
6 K. Herrmann, "Architecture and VLSI Implementation of a RISC Core for a Monolithic Video Signal Processor", in VLSI Signal Processing, VII, pp. 368-377, IEEE, New York, 1994.
7 Chin-Chen Chang, Min-Shian Hwang, Tung- Shou Chen, "A new encryption algorithm for image cryptosystems", The Journal of Systems and Software, Vol. 58, pp. 83-91, 2001.   DOI   ScienceOn
8 S. Li, X. Zheng, X. Mou, Y. Cai, "Chaotic encryption scheme for real time digital video", Proceedings of the SPIE on electronic imaging, San Jose, CA, USA, 2002.
9 G. Chen, Y. Mao and C.K. Chui, "A symmetric image encryption based on 3D chaotic maps", Chaos Solitons Fractals, Vol. 21, pp. 749-761, 2004.   DOI   ScienceOn
10 Shujun Li, Guanrong Chen and Xuan Zheng, "Chaos-based encryption for digital images and videos", chapter 4 in Multimedia Security Handbook, February 2004.
11 Yaobin Mao, Guanrong Chen, and Shiguo Lian, "A symmetric image encryption scheme based on 3D chaotic Cat maps", Chaos, Solitons and Fractals, Vol. 21, pp. 749-761, 2004.   DOI   ScienceOn
12 나성훈, 신현식, "VoIP 보안 관련 주요기술에 대한 분석", 한국전자통신학회논문지, 5권, 4호, pp. 385-390, 2010.
13 김용연, "프랙털 영상 부호화에 관한 연구", 한국전자통신학회논문지, 7권, 3호, pp. 559-566, 2012.