scholarly journals Application of Fourier Methods and Discrete-Cosinus Transformation in the Process of Processing of TV Images

This article describes the Fourier and discrete-cosine transform methods in the processing of TV images. The methods used in the processing of color and TV images, based on different physical effects, information processing technologies and hardware. The images obtained using these methods will have their own specifics. This, in turn, causes a wide variety of approaches both to the assessment of the quality of TV images and to the processing of such images.

Author(s):  
SOFIA SAIDAH ◽  
NUR IBRAHIM ◽  
MOCHAMMAD HALDI WIDIANTO

ABSTRAKPada studi ini, dilakukan penggabungan metode - metode untuk memperkuat dan meningkatkan sisi keamanan proses pertukaran informasi atau pesan digital. Metode yang digunakan diantaranya adalah metode kriptografi dan metode steganografi. Implementasi pada sistem yang dibangun dilakukan dengan menyandikan pesan pada penerapan metode steganografi citra dalam menyembunyikan pesan tersandi yang dihasilkan ke dalam sebuah citra warna (RGB) dalam domain Discrete Cosine Transform dengan teknik penyisipan Spread Spectrum. Hasil penelitian menunjukan bahwa kualitas dari stego image sangat mirip dengan cover citra yang digunakan, berdasarkan perolehan nilai performansi objektif PSNR diatas 30 db dan subjektif MOS di atas nilai 4.Kata kunci: Steganografi, Discrete Cosine Transform, Spread Spectrum, PSNR, SNR ABSTRACTIn this study, a combination of methods was used to strengthen and enhance the security side of the process of exchanging information or digital messages. The methods used include cryptographic methods and steganography methods. The implementation of the system built is done by encoding the message on the application of the image steganography method in hiding the encrypted message generated into a color image (RGB) in the Discrete Cosine Transform domain with the Spread Spectrum insertion technique. The results of the study show that the quality of the stego image is very similar to the cover image used, based on the acquisition of an objective performance value of PSNR above 30 db and subjective MOS above a value of 4.Keywords: Steganografi, Discrete Cosine Transform, Spread Spectrum, PSNR, SNR


Author(s):  
DANESHWARI I. HATTI ◽  
SAVITRI RAJU ◽  
MAHENDRA M. DIXIT

In digital communication bandwidth is essential parameter to be considered. Transmission and storage of images requires lot of memory in order to use bandwidth efficiently neural network and Discrete cosine transform together are used in this paper to compress images. Artificial neural network gives fixed compression ratio for any images results in fixed usage of memory and bandwidth. In this paper multi-layer feedforward neural network has been employed to achieve image compression. The proposed technique divides the original image in to several blocks and applies Discrete Cosine Transform (DCT) to these blocks as a pre-process technique. Quality of image is noticed with change in training algorithms, convergence time to attain desired mean square error. Compression ratio and PSNR in dB is calculated by varying hidden neurons. The proposed work is designed using MATLAB 7.10. and synthesized by mapping on Vertex 5 in Xilinx ISE for understanding hardware complexity. Keywords - backpropagation, Discrete


2011 ◽  
Vol 121-126 ◽  
pp. 2190-2194
Author(s):  
Chao Kui Wu ◽  
Liang Yong Huang

To solve the image feature information on the robustness of JPEG compression problems, we use the third layer of wavelet of images to decompose the approximation sub-band coefficients as the image feature information, analyze the characteristics of the discrete cosine transform in JPEG compression so as to compare the robustness of image feature information under different quality of JPEG compression. The experimental results show that: make the image compression quality factor more than the standard JPEG, the approximate sub-band coefficients of image wavelet as the image feature information has better robustness, and their difference is less than or equal to a smaller threshold.


2014 ◽  
Vol 1044-1045 ◽  
pp. 1463-1468
Author(s):  
Xiao Cui ◽  
Wu Qing Zhang

In order to suppress the noise, improve equipment's ability to further process information and improve the quality of voice, speech enhancement is often an important part of the speech signal preprocess. Contrastively analyze the characteristic that the clean speech signal coefficients in over-complete discrete cosine dictionary are much sparser than the traditional discrete cosine transform coefficients. Under noisy conditions, by setting the iterative threshold of orthogonal matching pursuit (OMP) algorithm, clean speech can be gotten, thus realize the speech enhancement. Simulation results of the signal waveform and spectrogram enhanced by the proposed algorithm are very similar to the original signal,comparative experiments also indicate that the signal to noise ratio (SNR) and the perceptual evaluation of speech quality (PESQ) score of the processed signal are superior to traditional discrete cosine transform (DCT).


2017 ◽  
Vol 2 (1) ◽  
pp. 1-11 ◽  
Author(s):  
De Rosal Ignatius Moses Setiadi ◽  
Eko Hari Rachmawanto ◽  
Christy Atika Sari

Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR) and ormalize cross Correlation (NCC) to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords—Image Steganography, Discrete Cosine Transform (DCT), One Time Pad, Vernam, Chiper, Image Cryptography


2011 ◽  
Vol 268-270 ◽  
pp. 1697-1700
Author(s):  
Jun Jie Wang ◽  
Qian Mo ◽  
Dong Xia Mei ◽  
Su Li

An image watermarking algorithm using Least Significant Bit is presented. Firstly, Logistic chaotic map is utilized to generate embedding bits for the watermark. Then, the discrete cosine transform is performed on the host image, and the hiding bit is embedded in the coefficient of discrete cosine transform by replacing Least Significant Bit, which causes minimal distortion of the host image.The original host image is not required when extracting the watermark . Experimental results show that the watermarked image almost has no difference from the original host image, and the quality of the extracted image is satisfying, the capacity of this algorithm is high. This algorithm is robust to many attacks, such as noise attack, JPEG Compression attack. Introduction


2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
S. E. Tsai ◽  
K. C. Liu ◽  
S. M. Yang

This paper proposes an image watermarking method based on the fast discrete cosine transform (DCT) algorithm for implementation in digital signal processor. A digital watermark can be effectively embedded and efficiently extracted without the host image. The keys in watermarking process include four frequency coefficients in DCT, two random permutation vectors, and a quantization matrix for normalizing the watermark and the host image. The fast DCT algorithm has been shown to reduce the complexity of two-dimensional image transformation so that embedding/decoding an image watermark can be completed in real time within 0.33 seconds. The quality of both watermarked image and extracted (retrieved) watermark remains excellent. It is shown that the watermarking method is efficient in and robust to data cropping, transmission loss, and compression/decompression.


2014 ◽  
Vol 17 (1) ◽  
pp. 121-130
Author(s):  
Faraidoon H. Ahmad ◽  
◽  
Aree A. Mohammed ◽  

Sign in / Sign up

Export Citation Format

Share Document