• Title/Summary/Keyword: Bit Stream

Search Result 315, Processing Time 0.031 seconds

The Review of JPEG2000 Algorithm using Optimal Rate Control (비율 제어 최적화를 이용한 JPEG2000 알고리즘 리뷰)

  • Chong, Hyun-Jin;Kim, Young-Seop
    • Journal of the Semiconductor & Display Technology
    • /
    • v.8 no.1
    • /
    • pp.19-25
    • /
    • 2009
  • Abstract JPEG2000 achieve quality scalability through the rate control method used in the encoding process, which embeds quality layers to the code-stream. This architecture might raise two drawbacks. First, when the coding process finishes, the number and bit-rates of quality layers are fixed, causing a lack of quality scalability to code-stream encoded with a single or few quality layers. Second, in Post compression rate distortion (PCRD) the bit streams after the truncation points discarded. Therefore, computational power for the discarded bit streams is wasted. For solving of problem, through bit rate control, there are many researches. Each proposed algorithms have specially target feature that is improved performance like reducing computational power. Research results have strength and weakness. For the mean time, research contents are reviewed and compared, so we proposed research direction in the future.

  • PDF

Adaptive Line Echo Cancellation combined with the Different Bit-rate Speech Coders. (다른 비트율을 갖는 음성 부호화기와 결합된 적응 선로 반향 제거)

  • 이지하;이규하;김용진;정성헌;박영철;윤대희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3B
    • /
    • pp.577-583
    • /
    • 2000
  • An efficient echo cancellation method, which controls the echo caused from the PSTN, is proposed. In our situation, the PSTN is connected to the mobile subscriber and the base-station which use different bit-rate CVSD(continuously variable slope delta modulation) coders and echo canceller is installed at the location of the base-station. By using the symmetry of the coder pairs. the proposed method shortens the echo pate length and reduces the nonlinear distortion inherent in the coders. And it is implemented in the decoded signal region, so fitted to the general-purpose DSP implementation. We also proposed a echo cancellation method using the combined bit-stream so as to implement without the multipliers onto the VLSI. It has an improved echo cancellation performance by reducing the high frequency noises in the coders. And it has an reduced complexity by reducing the excitation rate of the bit-stream.

  • PDF

Reverse Trick Mode Algorithms of MPEG Bit Stream (MPEG Bit Stream에서의 Reverse Trick Mode 알고리즘)

  • 신성욱;이동호
    • Proceedings of the IEEK Conference
    • /
    • 2001.09a
    • /
    • pp.689-692
    • /
    • 2001
  • 대용량 hard disk를 내장하고 있는 DTV용 PVR(Personal video recorder)에서는 단순히 수신되는 방송 stream을 녹화하고 재생하는 기능 뿐만 아니라 다른 여러 가지의 부가적인 기능들을 지원하는 것이 필요하다. 그 중의 하나가 기존의 아날로그 VCR의 사용자들에게 친숙한 fast-forward play, reverse play, pause 등과 같은 trick mode play기능을 지원하는 것이다. 그러나 MPEG video는 화면간의 상관관계를 이용하여 압축하는 방식을 채택하고 있으므로 재생하고자 하는 frame이 intra frame이 아닌 한 독립적으로 재생할 수가 없어서 trick mode play 기능을 구현하기가 용이하지 않다. 특히 reverse trick mode의 경우에는 original stream에서의 마지막 frame이 먼저 display되어야 하는데 이를 위해 하나의 GOP가 모두 decoding되어야 하므로 더욱 그 구현이 어렵다. 본 논문에서는 reverse trick mode를 구현하기 위한 여러 알고리즘을 소개하고 이에 대한 system 복잡도, 메모리 사용량 성능 등을 분석하고자 한다.

  • PDF

MPEG-based Transcoding for Scalable Video-on-Demand System

  • Naoki-Kobayashi;Satoshi-Ishibashi;Susumu-Ichinose
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1999.06a
    • /
    • pp.63.1-68
    • /
    • 1999
  • MPEG-2 transcoding scheme is proposed as scalable transmission system for a video-on-demand system is described. In this system video contents encoded by MPEG-2 are transmitted to receiver terminals via communication lines that have different bit rate. A transcoding technique that directly converts a bit stream encoded by MPEG-2 into a lower coding rate stream without decoding is proposed. The transcoder called Trampeg includes size reduction and frame drop approach. The experimental results show that an MPEG-2 stream of 0 Mbps is able to be transcoded into a stream of 1.5 Mbps-300 Kbps.

Random Sequence Synchronization for Radio Secure Communication Using Synchronous Stream Cipher (동기식 스트림 암호와 방식을 이용한 무선 암호 통신에서의 난수열 동기)

  • 손해성;홍진근김강욱황찬식
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.66-69
    • /
    • 1998
  • The synchronous stream cipher has the advantage that one bit error in the ciphertext only affects the corresponding bit in the plaintext, but it requires the perfect synchronization between encryptor and decryptor. For synchronization, a periodic resynchronization has been used in many applications. In this paper, we propose the periodic resynchronization scheme for radio secure communication and evaluate the performances according to the period of sync pattern and session key under radio channel environment having 10-2~ 10-6 BER.

  • PDF

A fast watermark embedding method for MPEG-2 bit stream (MPEG-2 비트 스트림에 대한 고속 워터마크 삽입방법)

  • 김성일;서정일;김구영;원치선
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1997.11a
    • /
    • pp.151-154
    • /
    • 1997
  • In this paper, we propose a new watermarking algorithm for copyright protection of video data. The proposed algorithm inserts a watermark directly on the MPEG-2 bitstream. Since more and more video data are stored and transmitted in a compressed form, it is desirable to insert a watermark on the compressed bit stream to avoid the expensive full-decoding and re-encoding process. Embedding a watermark in the compressed domain, we can also avoid the effect of the compression error which may erase the watermark.

  • PDF

Design and Implementation of Stream Cipher based on SHACAL-2 Superior in the Confidentiality and Integrity (기밀성과 무결성이 우수한 SHACAL-2 기반 스트림 암호 설계 및 구현)

  • Kim, Gil Ho;Cho, Gyeong Yeon
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.12
    • /
    • pp.1427-1438
    • /
    • 2013
  • We have developed a 128-bit stream cipher algorithm composed of the 5-stage pipeline, capable of real-time processing, confidentiality and integrity. The developed stream cipher is a stream cipher algorithm that makes the final 128-bit ciphers through a whitening process after making the ASR 277 bit and SHACAL-2 and applying them to the CFB mode. We have verified the hardware performance of the proposed stream cipher algorithm with Modelsim 6.5d and Quartus II 12.0, and the result shows that the hardware runs at 33.34Mhz(4.27Gbps) at worst case. According to the result, the new cipher algorithm has fully satisfied the speed requirement of wireless Internet and sensor networks, and DRM environment. Therefore, the proposed algorithm with satisfaction of both confidentiality and integrity provides a very useful ideas.

Channel Transition Analysis of Smart HLS with Dynamic Single Buffering Scheme (동적 단일 버퍼링 기법을 적용한 스마트 HLS의 채널변경 분석)

  • Kim, Chong-il;Kang, Min-goo;Kim, Dong-hyun;Kim, In-ki;Han, Kyung-sik
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.9-15
    • /
    • 2016
  • In this paper, we propose a smart HLS(HTTP Live Stream) platform with dynamic single buffering for the best transmission of adaptive video bit-rates. This smart HLS can optimizes the channel transition zapping-time with the monitoring of bandwidth between HLS server and OTT(Over The Top) client. This platform is designed through the control of video stream due to proper multi-bitrates and bandwidths. This proposed OTT can decode the live and VOD(Video On Demand) videos with the buffering of optimumal bitrate. And, the HLS can be cooperated with a smart OTT, and segmented for the m3u8 files of H.265 MPEG-2 TS(Transport Stream) videos. As a resullt, this single buffer based smart OTT can transmit optimal videos with the maximum data buffering according to the adaptive bit-rate depending on the network bandwidth efficiency and the decoded VOD video, too.

Secure Fingerprint Identification System based on Optical Encryption (광 암호화를 이용한 안전한 지문 인식 시스템)

  • 한종욱;김춘수;박광호;김은수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2415-2423
    • /
    • 1999
  • We propose a new optical method which conceals the data of authorized persons by encryption before they are stored or compared in the pattern recognition system for security systems. This proposed security system is made up of two subsystems : a proposed optical encryption system and a pattern recognition system based on the JTC which has been shown to perform well. In this system, each image of authorized persons as a reference image is stored in memory units through the proposed encryption system. And if a fingerprint image is placed in the input plane of this security system for access to a restricted area, the image is encoded by the encryption system then compared with the encrypted reference image. Therefore because the captured input image and the reference data are encrypted, it is difficult to decrypt the image if one does not know the encryption key bit stream. The basic idea is that the input image is encrypted by performing optical XOR operations with the key bit stream that is generated by digital encryption algorithms. The optical XOR operations between the key bit stream and the input image are performed by the polarization encoding method using the polarization characteristics of LCDs. The results of XOR operations which are detected by a CCD camera should be used as an input to the JTC for comparison with a data base. We have verified the idea proposed here with computer simulations and the simulation results were also shown.

  • PDF