• Title/Summary/Keyword: Bit plane

Search Result 143, Processing Time 0.023 seconds

Development of efficient wavelet packet algorithm for image coding (영상 부호화를 위한 효율적인 웨이브렛 패킷 알고리즘 개발)

  • 정미숙;임봉균;박정호;황병하;최재호;곽훈성
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.9
    • /
    • pp.99-108
    • /
    • 1997
  • An efficient wavelet packet algorithm to find wavelet packet quickly is presented in this paper. The top-down method maximizing the transform coding gain that is obtained from the second moment of the band is used to divide the subbands into wavelet tree. The bit allocation for each band in the tree is performed in proportion to its variance. Bands are coded by the lossless coding algorithm called the bit plane run length coding(BPRLC) and uniform quantizer. The proposed algorithm is compared with of the single tree algorithim proposed by Ramchandran and Vetterli. To verify the efficiency of our algorithm, simulations are jperformed using several sets of images. The results show us that our method reduces the execution time by about forty percent of that required by the single tree method while maintaining the comparable reconstructed image qualities.

  • PDF

Design of an EBCOT in JPEG2000 for a Web Camera Server (웹 카메라 서버용 JPEG2000 의 EBCOT 설계에 관한 연구)

  • Park, Ju-Hyun;Kim, Young-Chul;Hong, Sung-Hoon;Lee, Myung-Ok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10a
    • /
    • pp.151-154
    • /
    • 2001
  • 본 연구는 웹 카메라에 적용하기 위한 JPEG2000의 주요 블록인 EBCOT(Embedded Block Coding with Optimized Truncation)의 설계 및 구현에 관한 연구이다. EHCOT 블록은 웨이블렛(wavelet)변환에 의해 분할된 각 sub-band에 존재하는 주위 화소 값들과 상위 bit-plane의 값들에 대한 상호 연관성을 조사하여 context을 추출하고 그 context를 이용하여 엔트로피 부호화(entropy coding)를 수행하는 T1(Tier 1) 블록과 bit-stream을 구성하는 T2(Tier 2) 블록으로 구성된다. 본 논문에서는 JPEG2000에서 전체 압축성능을 좌우하는 EBCOT의 T1 블록을 Synopsys tool을 이용하여 설계하고 구현하였다.

  • PDF

Design of L-Band Cylindrical Active Phase Array Antenna Using Bent Dipoles (접힌 다이폴 구조를 적용한 L-Band 원통형 능동 위상배열 안테나 설계)

  • Lee, Man-Gyu;Kwon, Ickjin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.43-55
    • /
    • 2013
  • In this paper, we propose a cylindrical active phased array antenna of Beam Steering Characteristics in the horizontal plane(H-plane) and vertical plane(E-Plane) on the cylinder form array structure. We design the bent dipole antenna of the cylindrical array structure adapted excellent mutual-coupling characteristics, designed and manufactured the cylindrical array antennas and power combiner/divider unit for power dividing and combining on the antenna. The radiating elements array spacing of Cylindrical array antenna were determined to avoid grating lobes at half power beam steering. Beam steering of the antenna was implemented with 6-bit phase shifter in the transceiver and have been designed based on the characteristics the antenna beam steering at -24 degrees to 24 degrees horizontal, vertical 0 degrees to 36 degrees beam steering. A cylindrical active phased array antenna that produced for verification the performance of the antenna are measured radiation characteristics in accordance with beam steering at L-Band.

Fragile Image Watermarking Using Bit Planes (비트 플레인을 이용한 영상의 연성 워터마킹)

  • 이혜주
    • Journal of Broadcast Engineering
    • /
    • v.6 no.1
    • /
    • pp.41-49
    • /
    • 2001
  • Digital watermarking has been proposed for copyright protection of digital data. According to the property of an embedded watermark, it is classified into two categories, robust watermarking and fragile watermarking. The former is used for copyright protection, and the latter applies to the authentication/integrity to verify the authenticity of data, If an Image has been modified or forged. the embedded watermark cannot be extracted from the Image. As a results, it is possible to defect the modification of the image. As pixels are represented by tilts, the modification of bits corresponds to the alteration of the image. In this paper, a new fragile watermarking is proposed In which two watermarks are embedded in order to detect some modification occurred In high and low bit Planes. From simulation results, the embedded watermark is Invisible in a watermarked image and we can locale some Places where the modification occurring

  • PDF

Pyramid Image Coding Using Edge Information (Edge 정보에 근거한 피라미드 영상부호화)

  • Kim, Hae-Sung;Kim, Nam-Chul
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.25 no.10
    • /
    • pp.1225-1233
    • /
    • 1988
  • In this paper, several simple approaches to Laplacian pyramid coding have been presented for obtaining reasonably acceptable image quality even at low bit rates of 0.3-0.5 bits/pel. For this purpose, the feedback construction of each Lapliacian plane, 3-dimensional prediction and three-level center-clipping quantization are introduced into the coding procedures. For greatly reducing the bit rate of the bottom layer, two new schemes of conditional transmission and edge sharpening without transmission are used. In experiments, our latter sheme has yielded the total bit rate of about 0.3 bits/pel while retaining reasonably acceptable image quality.

  • PDF

A Study of Very Low Bit-Rate Color Video Coding Using Adaptive Wavelet Trasform (적응적 웨이블릿 변환을 이용한 저속 비트율 컬러 비디오 코딩에 관한 연구)

  • Kim, Hye-Gyeong;O, Hae-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2S
    • /
    • pp.701-710
    • /
    • 2000
  • This paper presents a new method for an efficient coding of very low bit-rate color video based on adaptive wavelet transform. Our approach reveals that the coding process works more efficiently if the quantized wavelet coefficients are preprocessed by a mechanism exploiting the redundancies in the wavelet subband structure. Thus, we focuses optimized activity of coding part, and exhaustive overlapped block motion compensation is utilized to ensure coherency in motion compensated error frames, and raised cosine window is applied. The horizontal and vertical components of motion vectors are encoded separately using adaptive arithmetic coding while significant wavelet coefficients are encoded in bit-plane order using adaptive arithmetic coding. On average the proposed codec exceeds H.263 and ZTE in peak signal-to-noise ratio by as much as 2.07 and 1.38dB at 28 kbits, respectively. Fore entire sequence coding, 3DWCVC method is superior to H.263 and ZTE by 0.35 and 0.71dB on average, respectively.

  • PDF

Depth-map coding using the block-based decision of the bitplane to be encoded (블록기반 부호화할 비트평면 결정을 이용한 깊이정보 맵 부호화)

  • Kim, Kyung-Yong;Park, Gwang-Hoon
    • Journal of Broadcast Engineering
    • /
    • v.15 no.2
    • /
    • pp.232-235
    • /
    • 2010
  • This paper proposes an efficient depth-map coding method. The adaptive block-based depth-map coding method decides the number of bit planes to be encoded according to the quantization parameters to obtain the desired bit rates. So, the depth-map coding using the block-based decision of the bit-plane to be encoded proposes to free from the constraint of the quantization parameters. Simulation results show that the proposed method, in comparison with the adaptive block-based depth-map coding method, improves the average BD-rate savings by 3.5% and the average BD-PSNR gains by 0.25dB.

Secure Fingerprint Identification System based on Optical Encryption (광 암호화를 이용한 안전한 지문 인식 시스템)

  • 한종욱;김춘수;박광호;김은수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2415-2423
    • /
    • 1999
  • We propose a new optical method which conceals the data of authorized persons by encryption before they are stored or compared in the pattern recognition system for security systems. This proposed security system is made up of two subsystems : a proposed optical encryption system and a pattern recognition system based on the JTC which has been shown to perform well. In this system, each image of authorized persons as a reference image is stored in memory units through the proposed encryption system. And if a fingerprint image is placed in the input plane of this security system for access to a restricted area, the image is encoded by the encryption system then compared with the encrypted reference image. Therefore because the captured input image and the reference data are encrypted, it is difficult to decrypt the image if one does not know the encryption key bit stream. The basic idea is that the input image is encrypted by performing optical XOR operations with the key bit stream that is generated by digital encryption algorithms. The optical XOR operations between the key bit stream and the input image are performed by the polarization encoding method using the polarization characteristics of LCDs. The results of XOR operations which are detected by a CCD camera should be used as an input to the JTC for comparison with a data base. We have verified the idea proposed here with computer simulations and the simulation results were also shown.

  • PDF

Assessment of Notch Effect on Fracture Plane Control (노치 발파공에 의한 파단면 제어 효과에 관한 연구)

  • Kim, Kwang-Yeom;Kim, Dong-Gyou;Jeong, Dong-Ho;Cho, Sang-Ho
    • Explosives and Blasting
    • /
    • v.26 no.1
    • /
    • pp.57-66
    • /
    • 2008
  • It has been proven that the pre-cracking notches in a blasting hole are applicable to control crack growth along specific direction. This study compared the roughnesses of the fracture plane resulting from test blasts using a regular charge hole and notched charge hole to investigate the effect of the notches of charge hole on the formation of fracture plane. A notch bit system was used to drill the notched hole in the rock specimens. The surfaces of the fracture planes were reconstructed as Digital Elevation Model (DEM) using digital photogrammetric method and the roughnesses of the surfaces were estimated with Surface Roughness Profile Index (SRp).

Medical Image Verification Watermarking for Healthcare Information Management

  • Choi, Un-Sook;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.205-210
    • /
    • 2017
  • This paper presents a verification watermarking applied to healthcare information management. The proposed method uses the whole region based on the public-key cryptograph, which is transformed by the DWT transform to integrity verification. Furthermore, the public-key cryptograph algorithm is used for the embedded watermark image. We adaptively select the upper bit-plane including the LSB parts of each block when the watermark is inserted.