• Title/Summary/Keyword: inverse transform

Search Result 467, Processing Time 0.032 seconds

Real-Time Implementation of MPEG-1 Layer III Audio Decoder Using TMS320C6201 (TMS320C6201을 이용한 MPEG-1 Layer III 오디오 디코더의 실시간 구현)

  • 권홍석;김시호;배건성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8B
    • /
    • pp.1460-1468
    • /
    • 2000
  • The goal of this research is the real-time implementation of MPEG-1 Layer III audio decoder using the fixed-point digital signal processor of TMS320C6201 The main job for this work is twofold: one is to convert floating-point operation in the decoder into fixed-point operation while maintaining the high resolution, and the other is to optimize the program to make it run in real-time with memory size as small as possible. We, especially, devote much time to the descaling module in the decoder for conversion of floating-point operation into fixed-point operation with high accuracy. The inverse modified cosine transform(IMDCT) and synthesis polyphase filter bank modules are optimized in order to reduce the amount of computation and memory size. After the optimization process, in this paper, the implemented decoder uses about 26% of maximum computation capacity of TMS320C6201. The program memory, data ROM, data RAM used in the decoder are about 6.77kwords, 3.13 kwords and 9.94 kwords, respectively. Comparing the PCM output of fixed-point computation with that of floating-point computation, we achieve the signal-to-noise ratio of more than 60 dB. A real-time operation is demonstrated on the PC using the sound I/O and host communication functions in the EVM board.

  • PDF

Single Path Phase-only Security System using Phase-encoded XOR Operations in Fourier Plane (푸리에 영역에서의 위상 변조 Exclusive-OR 연산을 이용한 단일 경로 위상 암호화 시스템)

  • Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong;Noh, Duck-Soo
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.4
    • /
    • pp.326-333
    • /
    • 2005
  • Phase-only encryption scheme using exclusive-OR rules in Fourier plane and a single path decryption system are presented. A zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using XOR rules. A decryption is simply performed based on 2-1 setup with spatial filter by Fourier transform for multiplying phase-only encrypted data by phase-only key data, which are obtained by phase-encoding process, and spatial filtering for zero-order elimination in inverse-Fourier plane. Since the encryption process is peformed in Fourier plane, proposed encryption scheme is more tolerant to loss of key information by scratching or cutting than previous XOR encryption method in space domain. Compare with previous phase-visualization systems, due to the simple architecture without a reference wave, our system is basically robust to mechanical vibrations and fluctuations. Numerical simulations have confirmed the proposed technique as high-level encryption and simple decryption architecture.

Double Encryption of Digital Hologram Based on Phase-Shifting Digital Holography and Digital Watermarking (위상 천이 디지털 홀로그래피 및 디지털 워터마킹 기반 디지털 홀로그램의 이중 암호화)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2017
  • In this Paper, Double Encryption Technology Based on Phase-Shifting Digital Holography and Digital Watermarking is Proposed. For the Purpose, we First Set a Logo Image to be used for Digital Watermark and Design a Binary Phase Computer Generated Hologram for this Logo Image using an Iterative Algorithm. And Random Generated Binary Phase Mask to be set as a Watermark and Key Image is Obtained through XOR Operation between Binary Phase CGH and Random Binary Phase Mask. Object Image is Phase Modulated to be a Constant Amplitude and Multiplied with Binary Phase Mask to Generate Object Wave. This Object Wave can be said to be a First Encrypted Image Having a Pattern Similar to the Noise Including the Watermark Information. Finally, we Interfere the First Encrypted Image with Reference Wave using 2-step PSDH and get a Good Visible Interference Pattern to be Called Second Encrypted Image. The Decryption Process is Proceeded with Fresnel Transform and Inverse Process of First Encryption Process After Appropriate Arithmetic Operation with Two Encrypted Images. The Proposed Encryption and Decryption Process is Confirmed through the Computer Simulations.

Image Watermark Method Using Multiple Decoding Keys (다중 복호화 키들을 이용한 영상 워터마크 방법)

  • Lee, Hyung-Seok;Seo, Dong-Hoan;Cho, Kyu-Bo
    • Korean Journal of Optics and Photonics
    • /
    • v.19 no.4
    • /
    • pp.262-269
    • /
    • 2008
  • In this paper, we propose an image watermark method using multiple decoding keys. The advantages of this method are that the multiple original images are reconstructed by using multiple decoding keys in the same watermark image, and that the quality of reconstructed images is clearly enhanced based on the idea of Walsh code without any side lobe components in the decoding process. The zero-padded original images, multiplied with random-phase pattern to each other, are Fourier transformed. Encoded images are then obtained by taking the real-valued data from these Fourier transformed images. The embedding images are obtained by the product of independent Walsh codes, and these spreaded phase-encoded images which are multiplied with new random-phase images. Also we obtain the decoding keys by multiplying these random-phase images with the same Walsh code images used in the embedding images. A watermark image is then made from the linear superposition of the weighted embedding images and a cover image, which is multiplied with a new independent Walsh code. The original image is simply reconstructed by the inverse-Fourier transform of the despreaded image of the multiplication between the watermark image and the decoding key. Computer simulations demonstrate the efficiency of the proposed watermark method with multiple decoding keys and a good robustness to the external attacks such as cropping and compression.

Folding Analysis of Paper Structure and Estimation of Optimal Collision Conditions for Reversal (종이구조물의 접기해석과 반전을 위한 최적충돌조건의 산정)

  • Gye-Hee Lee
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.36 no.4
    • /
    • pp.213-220
    • /
    • 2023
  • This paper presents a model simulating the folding process and collision dynamics of "ddakji", a traditional Korean game played using paper tiles (which are also referred to as ddakji). The model uses two A4 sheets as the base materials for ddakji. The folding process involves a series of boundary conditions that transform the wing part of the paper structure into a twisted configuration. A rigid plate boundary condition is also adopted for squeezing, establishing the shape and stress state of the game-ready ddakji through dynamic relaxation analysis. The gaming process analysis involves a forced displacement of the striking ddakji to a predetermined collision position. Collision analysis then follows at a given speed, with the objective of overturning the struck ddakji--a winning condition. A genetic algorithm-based optimization analysis identifies the optimal collision conditions that result in the overturning of the struck ddakji. For efficiency, the collision analysis is divided into two stages, with the second stage carried out only if the first stage predicts a possible overturn. The fitness function for the genetic algorithm during the first stage is the direction cosine of the struck ddakji, whereas in the second stage, it is the inverse of the speed, thus targeting the lowest overall collision speed. Consequently, this analysis provides optimal collision conditions for various compression thicknesses.

A Study on Hydraulic Characteristics of Rock Joints Dependant on JRC Ranges (JRC 등급에 따른 절리면 수리특성 연구)

  • Chae Byung-Gon;Seo Yong-Seok;Kim Ji-Soo
    • The Journal of Engineering Geology
    • /
    • v.14 no.4 s.41
    • /
    • pp.461-468
    • /
    • 2004
  • In order to characterize hydraulic property dependant on join roughness in rock mass, this study computed permeability coefficients on each range of joint roughness coefficient (JRC) suggested by Barton(1976). For a quantitative analysis of roughness components spectral analysis using the fast fourier transform was performed to select effective frequencies on each PC range. The results of spectral analyses show that low ranges of the JRC are mainly composed of low frequency domain, while high ranges of the JRC have dominant components at high frequency domain. The inverse Fourier transform made it possible to generate joint models of each JRC range using the effective frequencies of roughness spectrum. The homogenization analysis was applied to calculate permeability coefficient at homogeneous microscale, and then, computes a homogenized permeability coefficient (C-permeability coefficient) at macro scale. Therefore, it is possible to analyze accurate characteristics of permeability reflected with local effect of facture geometry. According to the calculation results, permeability coefficients were distributed between $10^{-3}m/sec\;and\;10^{-4}/sec$. In cases of sheared joint models permeability coefficients were plotted between $10^{-4}m/sec\;and\;10^{-5}/sec$, showing irregular distribution of permeability coefficients on each IRC range. The differences of permeability coefficients for the same aperture models or for the sheared joint models indicate that changes of roughness pattern influence on permeability coefficients. Therefore, the effect of joint roughness should be considered to characterize hydraulic properties in rock joints.

Crosshole EM 2.5D Modeling by the Extended Born Approximation (확장된 Born 근사에 의한 시추공간 전자탐사 2.5차원 모델링)

  • Cho, In-Ky;Suh, Jung-Hee
    • Geophysics and Geophysical Exploration
    • /
    • v.1 no.2
    • /
    • pp.127-135
    • /
    • 1998
  • The Born approximation is widely used for solving the complex scattering problems in electromagnetics. Approximating total internal electric field by the background field is reasonable for small material contrasts as long as scatterer is not too large and the frequency is not too high. However in many geophysical applications, moderate and high conductivity contrasts cause both real and imaginary part of internal electric field to differ greatly from background. In the extended Born approximation, which can improve the accuracy of Born approximation dramatically, the total electric field in the integral over the scattering volume is approximated by the background electric field projected to a depolarization tensor. The finite difference and elements methods are usually used in EM scattering problems with a 2D model and a 3D source, due to their capability for simulating complex subsurface conductivity distributions. The price paid for a 3D source is that many wavenumber domain solutions and their inverse Fourier transform must be computed. In these differential equation methods, all the area including homogeneous region should be discretized, which increases the number of nodes and matrix size. Therefore, the differential equation methods need a lot of computing time and large memory. In this study, EM modeling program for a 2D model and a 3D source is developed, which is based on the extended Born approximation. The solution is very fast and stable. Using the program, crosshole EM responses with a vertical magnetic dipole source are obtained and the results are compared with those of 3D integral equation solutions. The agreement between the integral equation solution and extended Born approximation is remarkable within the entire frequency range, but degrades with the increase of conductivity contrast between anomalous body and background medium. The extended Born approximation is accurate in the case conductivity contrast is lower than 1:10. Therefore, the location and conductivity of the anomalous body can be estimated effectively by the extended Born approximation although the quantitative estimate of conductivity is difficult for the case conductivity contrast is too high.

  • PDF