• Title/Summary/Keyword: 2 dimensional discrete Fourier transform

Search Result 5, Processing Time 0.022 seconds

Characterization of Trabecular Bone Structure using 2D Fourier Transform and Fractal Analysis (Fractal dimension과 2차원 푸리에변환을 이용한 수질골의 특성화에 관한 실험적 연구)

  • Lee Keon Il
    • Journal of Korean Academy of Oral and Maxillofacial Radiology
    • /
    • v.28 no.2
    • /
    • pp.339-353
    • /
    • 1998
  • The purpose of this study was to investigate whether a radiographic estimate of osseous fractal dimension and power spectrum of 2D discrete Fourier transform is useful in the characterization of structural changes in bone. Ten specimens of bone were decalcified in fresh 50 ml solutions of 0.1 N hydrochloric acid solution at cummulative timed periods of 0 and 90 minutes. and radiographed from 0 degree projection angle controlled by intraoral parelleling device. I performed one-dimensional variance. fractal analysis of bony profiles and 2D discrete Fourier transform. The results of this study indicate that variance and fractal dimension of scan line pixel intensities decreased significantly in decalcified groups but Fourier spectral analysis didn't discriminate well between control and decalcified specimens.

  • PDF

Analysis of 2-Dimensional Object Recognition Using discrete Wavelet Transform (이산 웨이브렛 변환을 이용한 2차원 물체 인식에 관한 연구)

  • Park, Kwang-Ho;Kim, Chang-Gu;Kee, Chang-Doo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.16 no.10
    • /
    • pp.194-202
    • /
    • 1999
  • A method for pattern recognition based on wavelet transform is proposed in this paper. The boundary of the object to be recognized includes shape information for object of machine parts. The contour is first represented using a one-dimensional signal and normalized about translation, rotation and scale, then is used to build the wavelet transform representation of the object. Wavelets allow us to decompose a function into multi-resolution hierarchy of localized frequency bands. The recognition of 2-dimensional object based on the wavelet is described to analyze the shape of analysis technique; the discrete wavelet transform(DWT). The feature vectors obtained using wavelet analysis is classified using a multi-layer neural network. The results show that, compared with the use of fourier descriptors, recognition using wavelet is more stable and efficient representation. And particularly the performance for objects corrupted with noise is better than that of other method.

  • PDF

Maximum Entropy Power Spectral Estimation of Two-Dimensional Signal (2차원 신호의 최대 정보량을 갖는 전력 스펙트럼 추정)

  • Sho, Sang-Ho;Kim, Chong-Kyo;Lee, Moon-Ho
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.34 no.3
    • /
    • pp.107-114
    • /
    • 1985
  • This paper presents the iterative algorithm for obtaining the ME PSE(Maximum Entropy Power Spectral Estimation) of 2-dimensional signals. This problem involves a correction matching power spectral estimate that can be represented as the reciprocal of the spectral of 2-dimensional signals. This requires two matrix inversion every iterations. Thus, we compensate the matrix to be constantly positive definite with relaxational parameters. Using Row/Column decomposition Discrete Fourier Transform, we can decrease a calculation quantity. Using Lincoln data and white noise, this paper examines ME PSE algorithms. Finally, the results output at the graphic display device. The 2-dimensional data have the 3-dimensional axis components, and, this paper develops 3-dimensional graphic output algorithms using 2-dimensional DGL(Device Independent Graphic Library) which is prepared for HP-1000 F-series computer.

  • PDF

A Study on the Estimation of Ocean Surface Wave Information from Marine Radar Signals (선박 레이더 영상신호를 이용한 파랑정보 검출에 관한 연구)

  • Song, Chae-Uk;Kim, Chang-Je;Moon, Seong-Bae
    • Journal of Navigation and Port Research
    • /
    • v.27 no.5
    • /
    • pp.499-504
    • /
    • 2003
  • This paper describes the system for evaluating the sea wave informations such as wave direction and wave length in real time, by using image data obtained from the marine X-band radar. We proposed here a method for automatic selection of the partial image data without the user's individual selection at the radar. We also discussed that the wave direction could be obtained by a 2-dimensional discrete Fourier transform algorithm. We carried some evaluation works on the algorithm through computer simulation. The obtained thirteen radar image data under several sea surface conditions were analyzed by the method described and the result was presented.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.