• Title/Summary/Keyword: dctA

Search Result 846, Processing Time 0.03 seconds

Compression Method for Digital Hologram using Motion Prediction Method in Frequency-domain (주파수 영역에서 움직임 예측을 이용한 디지털 홀로그램 압축 기법)

  • Choi, Hyun-Jun;Bae, Yun-Jin;Seo, Young-Ho;Kang, Chang-Soo;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2091-2098
    • /
    • 2010
  • This paper proposes a hologram data compression scheme that uses the existing image/video compression techniques, in which the existing techniques are modified appropriately to fit to the characteristics of hologram. In this paper we use CGH as the hologram data. The proposed scheme uses the generation characteristics of a CGH to consist of a pre-processing, spatial segmentation of a CGH, frequency-transformation with 2D-DCT (2-dimensional discrete cosine transform), and motion estimation and residual image generation in the frequency-domain. It uses H.264/AVC, the lossless compressor BinHex, and a linear quantizer that we have made. From the experiments the proposed scheme showed the image quality of about 25.4 dB at the compression ratio of 10:1 and about 16.5dB at 90:1 compression ratio.

A FRINGE CHARACTER ANALYSIS OF FRINGE IMAGE (Fringe 영상의 주파수 특성 분석)

  • Seo Young-Ho;Choi Hyun-Jun;Kim Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11C
    • /
    • pp.1053-1059
    • /
    • 2005
  • The computer generated hologram (CGH) designs and produces digital information for generating 3-D (3-Dimension) image using computer and software instead of optically-sensed hologram of light interference, and it can synthesis a virtual object which is physically not in existence. Since digital hologram includes an amount of data as can be seen at the process of digitization, it is necessary that the data representing digital hologram is reduced for storing, transmission, and processing. As the efforts that are to handle hologram with a type of digital information have been increased, various methods to compress digital hologram called by fringe pattern are groped. Suitable proposal is encoding of hologram. In this paper, we analyzed the properties of CGH using tools of frequency transform, assuming that a generated CGH is a 2D image by introducing DWT that is known as the better tool than DCT for frequency transform. The compression and reconstruction result which was extracted from the wavelet-based codecs illustrates that it has better properties for reconstruction at the maximum 2 times higher compression rate than the Previous researches of Yoshikawa[2] and Thomas[3].

The Technique of Blocking Artifacts Reduction Method Based on Spatially Adaptive Image Restoration (공간 적응적 영상복원을 이용한 블록화 현상 제거 기법)

  • Kim, Tae-Keun;Woo, Hun-Bae;Paik, Joon-Ki
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.12
    • /
    • pp.46-54
    • /
    • 1998
  • In this paper we propose a fast adaptive image restoration filter using DCT-based block classification for reducing block artifacts in compressed images. In order to efficiently reduce block artifacts, edge direction of each block is classified by using the DCT coefficients, and the constrained least square (CLS) on the observation that the quantization operation in a series of coding process is a nonlinear and many-to-one mapping operator. And then we propose an approximated version of constrained optimization technique as a restoration process for removing the nonlinear and space-varying degradation operator. For real-time implementation, the proposed restoration filter can be realized in the form of a truncated FIR filter, which is suitable for postprocessing reconstructed images in HDTV, DVD, or video conference systems.

  • PDF

A Study on the Wet Clutch Pattern Design for the Drag Torque Reduction in Wet DCT System (습식 DCT의 드래그 토크 저감을 위한 클러치 패드 유로 설계)

  • Cho, Junghee;Han, Juneyeol;Kim, Woo-Jung;Jang, Siyoul
    • Tribology and Lubricants
    • /
    • v.33 no.2
    • /
    • pp.71-78
    • /
    • 2017
  • The drag torque in the wet clutch system of a dual clutch transmission system is investigated because it is relatively high, up to 10 of the total output torque of the engine, even when the clutch is in the disengagement state with zero torque transfer. Drag torque results from the shear resistance of the DCTF between the friction pad and separator plate. To reduce the drag torque for ensuring fuel economy, the groove pattern of the wet clutch friction pad is designed to have a high flow rate through the pattern groove. In this study, four types of groove patterns on the friction pad are designed. The volume fraction of the DCTF (VOF) and hydrodynamic pressure developments in the gap between the friction pad and separator plate are computed to correlate with the computation of the drag torque. From the computational results, it is found that a high VOF and hydrodynamics increase the drag torque resulting from the shear resistance of the DCTF. Therefore, a patterned groove design should be used for increasing the flow rate to have more air parts in the gap to reduce the drag torque. In this study, ANSYS FLUENT is used to solve the flow analysis.

ECG-based Biometric Authentication Using Random Forest (랜덤 포레스트를 이용한 심전도 기반 생체 인증)

  • Kim, JeongKyun;Lee, Kang Bok;Hong, Sang Gi
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.6
    • /
    • pp.100-105
    • /
    • 2017
  • This work presents an ECG biometric recognition system for the purpose of biometric authentication. ECG biometric approaches are divided into two major categories, fiducial-based and non-fiducial-based methods. This paper proposes a new non-fiducial framework using discrete cosine transform and a Random Forest classifier. When using DCT, most of the signal information tends to be concentrated in a few low-frequency components. In order to apply feature vector of Random Forest, DCT feature vectors of ECG heartbeats are constructed by using the first 40 DCT coefficients. RF is based on the computation of a large number of decision trees. It is relatively fast, robust and inherently suitable for multi-class problems. Furthermore, it trade-off threshold between admission and rejection of ID inside RF classifier. As a result, proposed method offers 99.9% recognition rates when tested on MIT-BIH NSRDB.

Blocking artifacts reduction for improving visual quality of highly compressed images (압축영상의 화질향상을 위한 블록킹 현상 제거에 관한 연구)

  • 이주홍;김민구;정제창;최병욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.8
    • /
    • pp.1677-1690
    • /
    • 1997
  • Block-transform coding is one of the most popular approaches for image compression. For example, DCT is widely used in the internaltional standards standards such as MPEG-1, MPEG-2, JPEG, and H.261. In the block-based transform coding, blocking artifacts may appear along block boundaries, and they can cause severe image degradation eqpecially when the transform coefficients are coarsely quantized. In this paper, we propose a new method for blocking artifacts reduction in transform-coded images. For blocking artifacts reduction, we add a correction term, on a block basis, composed of a linear combination of 28 basis images that are orthonormal on block boundaries. We select 28 DCT kernel functions of which boundary values are linearly independent, and Gram-Schmidt process is applied to the boundary values in order to obtain 28 boundary-orthonormal basis images. A threshold of bolock discontinuity is introduced for improvement of visual quality by reducing image blurring. We also investigate the number of basis images needed for efficient blocking artifacts reduction when the compression ratio changes.

  • PDF

Security of Image Information using Steganography and QR Code in IoT (IoT에서 스테가노그라피와 QR 코드를 이용한 영상 정보의 보안)

  • Im, Yong-Soon;Kang, Eun-Young;Park, Jae-Pyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.31-37
    • /
    • 2015
  • The security of the image information is very important in many areas of the IoT(Internet of Things), and study a number of ways to display the security (copyright, etc.). In this paper, information of image that is used by the IoT is converted to a DCT(Discrete Cosine Transform) and QC(Quantization Coefficient). And watermark (message) is to create a new encoded message(WMQR) through a QR Code. QC and WMQR applies LSB steganography techniques, can get the security (copyright, etc.) of image information. LSB steganographic techniques may be inserted according to a message (Watermark) to determine the location (Secret Key). The encoded image is sent to the recipient via the Internet. The reverse process can be obtained image and a QR code, a watermark (Message). A method for extracting a watermark from the security of the image information is coded using only the image and Secret Key, through the DCT and quantization process, so obtained by separating the watermark (Message) for the image. In this paper, we were able to improve the security of the method of image information, the image quality of the image by the simulations (PSNR), in turn, benefits were also normalized correlation (NC) and security.

Digital image watermarking techniques using multiresolution wavelet transform in Sequency domain (다해상도 웨이브렛 변환을 사용한 주파수 영역에서의 디지털 영상 워터마킹 기법)

  • 신종홍;연현숙;지인호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12A
    • /
    • pp.2074-2084
    • /
    • 2001
  • la this paper, a new digital watermarking algorithm using wavelet transform in frequency domain is suggested. The wavelet coefficients of low frequency subband are utilized to embed the watermark, After the original image is transformed using discrete wavelet transform, their coefficients are transformed into efficient1y in Sequency domain. DCT and FFT transforms are utilized in this processing. Watermark image of general image format is transformed using DCT and the hiding watermark into wavelet coefficients is equally distributed in frequency domain. Next, these wavelet coefficients are performed with inverse transform. The detection process of watermark is performed with reverse direction to insertion process. In this paper, we developed core watermark technologies which are a data hiding technology to hide unique logo mark which symbolizes the copyright and a robust protection technology to protect logo data from external attack like as compression, filtering, resampling, cropping. The experimental results show that two suggested watermarking technologies are invisible and robust.

  • PDF

A Study on Semi-fragile Watermarking for Robust Authentication on Image Compression (영상압축에 강인한 변질검증 워터마킹에 관한 연구)

  • Ahn, Sung-Cheol;Lee, Kyoung-Hak;Park, Hwa-Bum;Ko, Hyung-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12C
    • /
    • pp.1165-1172
    • /
    • 2006
  • The rapid progress of the software has enabled individuals to copy and remark digital contents, which was only done by professionals. As a solution for the problems, contents producer needs to have certification and inspection of its contents and hold the proprietary right. A fragile watermarking method is able to detect the distortion and damage of watermarked image, but the watermark is also fragile on standardized image compression. That is the problem of fragile watermarking technique. We propose semi-fragile watermarking technique that is robust in the image processing such as JPEG compression used on computer, but it is fragile on the addition of noise and other attacks. In the proposed method, we can generate the watermarks of an image from the relationship between two block coefficients, also the generated watermark is inserted into insensible part of HVS(Human Visual System) after processing DCT(Discrete Cosine Transform) and using quantization. As a result, on the spatial domain, high detection of distortion has been possible even in slight changes, and could detect the corrupted blocks on image. Therefore, it is simple to judge the pixels at which some location has been changed in the space.

Adaptive Postprocessing Technique for Enhancement of DCT-coded Images (DCT 기반 압축 영상의 화질 개선을 위한 적응적 후처리 기법)

  • Kim, Jong-Ho;Park, Sang-Hyun;Kang, Eui-Sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.930-933
    • /
    • 2011
  • This paper addresses an adaptive postprocessing method applied in the spatial domain for block-based discrete cosine transform (BDCT) coded images. The proposed algorithm is designed by a serial concatenation of a 1D simple smoothing filter and a 2D directional filter. The 1D smoothing filter is applied according to the block type, which is determined by an adaptive threshold. It depends on local statistical properties, and updates block types appropriately by a simple rule, which affects the performance of deblocking processes. In addition, the 2D directional filter is introduced to suppress the ringing effects at the sharp edges and the block discontinuities while preserving true edges and textural information. Comprehensive experiments indicate that the proposed algorithm outperforms many deblocking methods in the literature, in terms of PSNR and subjective visual quality evaluated by GBIM.

  • PDF